Mock Version: 0.9.14 Mock Version: 0.9.14 ENTER do(['bash', '--login', '-c', 'rpmbuild -bs --target i386 --nodeps builddir/build/SPECS/nss.spec'], False, '/var/lib/mock/centos6-rutgers-staging-build-2960-5083/root/', None, 86400, True, 0, 486, 495, None, logger=) Executing command: ['bash', '--login', '-c', 'rpmbuild -bs --target i386 --nodeps builddir/build/SPECS/nss.spec'] warning: Could not canonicalize hostname: opus3.rutgers.edu Building target platforms: i386 Building for target i386 Wrote: /builddir/build/SRPMS/nss-3.13.3-1.ru6.src.rpm Child returncode was: 0 LEAVE do --> ENTER do(['bash', '--login', '-c', 'rpmbuild -bb --target i386 --nodeps builddir/build/SPECS/nss.spec'], False, '/var/lib/mock/centos6-rutgers-staging-build-2960-5083/root/', None, 86400, True, 0, 486, 495, None, logger=) Executing command: ['bash', '--login', '-c', 'rpmbuild -bb --target i386 --nodeps builddir/build/SPECS/nss.spec'] Building target platforms: i386 Building for target i386 Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.IEs4tq + umask 022 + cd /builddir/build/BUILD + LANG=C + export LANG + unset DISPLAY + cd /builddir/build/BUILD + rm -rf nss-3.13.3 + /usr/bin/bzip2 -dc /builddir/build/SOURCES/nss-3.13.3-stripped.tar.bz2 + /bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + cd nss-3.13.3 + /bin/chmod -Rf a+rX,u+w,g-w,o-w . + /bin/cp /builddir/build/SOURCES/PayPalEE.cert -f ./mozilla/security/nss/tests/libpkix/certs + cd /builddir/build/BUILD + cd nss-3.13.3 + /usr/bin/bzip2 -dc /builddir/build/SOURCES/nss-pem-20101125.tar.bz2 + /bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + /bin/chmod -Rf a+rX,u+w,g-w,o-w . + echo 'Patch #3 (renegotiate-transitional.patch):' Patch #3 (renegotiate-transitional.patch): + /bin/cat /builddir/build/SOURCES/renegotiate-transitional.patch + /usr/bin/patch -s -p0 -b --suffix .transitional --fuzz=0 + echo 'Patch #6 (nss-enable-pem.patch):' Patch #6 (nss-enable-pem.patch): + /bin/cat /builddir/build/SOURCES/nss-enable-pem.patch + /usr/bin/patch -s -p0 -b --suffix .libpem --fuzz=0 + echo 'Patch #7 (nsspem-642433.patch):' Patch #7 (nsspem-642433.patch): + /bin/cat /builddir/build/SOURCES/nsspem-642433.patch + /usr/bin/patch -s -p0 -b --suffix .642433 --fuzz=0 + echo 'Patch #8 (0001-Bug-695011-PEM-logging.patch):' Patch #8 (0001-Bug-695011-PEM-logging.patch): + /bin/cat /builddir/build/SOURCES/0001-Bug-695011-PEM-logging.patch + /usr/bin/patch -s -p1 -b --suffix .695011 --fuzz=0 + echo 'Patch #16 (nss-539183.patch):' Patch #16 (nss-539183.patch): + /bin/cat /builddir/build/SOURCES/nss-539183.patch + /usr/bin/patch -s -p0 -b --suffix .539183 --fuzz=0 Patch #18 (nss-646045.patch): + echo 'Patch #18 (nss-646045.patch):' + /bin/cat /builddir/build/SOURCES/nss-646045.patch + /usr/bin/patch -s -p0 -b --suffix .646045 --fuzz=0 Patch #20 (nsspem-createobject-initialize-pointer.patch): + echo 'Patch #20 (nsspem-createobject-initialize-pointer.patch):' + /bin/cat /builddir/build/SOURCES/nsspem-createobject-initialize-pointer.patch + /usr/bin/patch -s -p1 -b --suffix .717338 --fuzz=0 Patch #21 (0001-libnsspem-rhbz-734760.patch): + echo 'Patch #21 (0001-libnsspem-rhbz-734760.patch):' + /bin/cat /builddir/build/SOURCES/0001-libnsspem-rhbz-734760.patch + /usr/bin/patch -s -p1 -b --suffix .734760 --fuzz=0 Patch #22 (nsspem-init-inform-not-thread-safe.patch): + echo 'Patch #22 (nsspem-init-inform-not-thread-safe.patch):' + /bin/cat /builddir/build/SOURCES/nsspem-init-inform-not-thread-safe.patch + /usr/bin/patch -s -p0 -b --suffix .736410 --fuzz=0 Patch #25 (nsspem-use-system-freebl.patch): + echo 'Patch #25 (nsspem-use-system-freebl.patch):' + /bin/cat /builddir/build/SOURCES/nsspem-use-system-freebl.patch + /usr/bin/patch -s -p0 -b --suffix .systemfreebl --fuzz=0 Patch #26 (nofipstest.patch): + echo 'Patch #26 (nofipstest.patch):' + /bin/cat /builddir/build/SOURCES/nofipstest.patch + /usr/bin/patch -s -p0 -b --suffix .nofipstest --fuzz=0 Patch #28 (nsspem-bz754771.patch): + echo 'Patch #28 (nsspem-bz754771.patch):' + /bin/cat /builddir/build/SOURCES/nsspem-bz754771.patch + /usr/bin/patch -s -p0 -b --suffix .754771 --fuzz=0 Patch #29 (nss-ssl-cbc-random-iv-off-by-default.patch): + echo 'Patch #29 (nss-ssl-cbc-random-iv-off-by-default.patch):' + /bin/cat /builddir/build/SOURCES/nss-ssl-cbc-random-iv-off-by-default.patch + /usr/bin/patch -s -p0 -b --suffix .770682 --fuzz=0 Patch #30 (bz784672-protect-against-calls-before-nss_init.patch): + echo 'Patch #30 (bz784672-protect-against-calls-before-nss_init.patch):' + /bin/cat /builddir/build/SOURCES/bz784672-protect-against-calls-before-nss_init.patch + /usr/bin/patch -s -p0 -b --suffix .784672 --fuzz=0 Patch #32 (Bug-800674-Unable-to-contact-LDAP-Server-during-winsync.patch): + echo 'Patch #32 (Bug-800674-Unable-to-contact-LDAP-Server-during-winsync.patch):' + /bin/cat /builddir/build/SOURCES/Bug-800674-Unable-to-contact-LDAP-Server-during-winsync.patch + /usr/bin/patch -s -p0 -b --suffix .800674 --fuzz=0 Patch #33 (Bug-800682-Qpid-AMQP-daemon-fails-to-load-after-nss-update.patch): + echo 'Patch #33 (Bug-800682-Qpid-AMQP-daemon-fails-to-load-after-nss-update.patch):' + /bin/cat /builddir/build/SOURCES/Bug-800682-Qpid-AMQP-daemon-fails-to-load-after-nss-update.patch + /usr/bin/patch -s -p0 -b --suffix .800682 --fuzz=0 Patch #34 (Bug-800676-nss-workaround-for-freebl-bug-that-causes-openswan-to-drop-connections.patch): + echo 'Patch #34 (Bug-800676-nss-workaround-for-freebl-bug-that-causes-openswan-to-drop-connections.patch):' + /bin/cat /builddir/build/SOURCES/Bug-800676-nss-workaround-for-freebl-bug-that-causes-openswan-to-drop-connections.patch + /usr/bin/patch -s -p0 -b --suffix .800676 --fuzz=0 + exit 0 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.3yWMtM + umask 022 + cd /builddir/build/BUILD + cd nss-3.13.3 + LANG=C + export LANG + unset DISPLAY + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + BUILD_OPT=1 + export BUILD_OPT + XCFLAGS='-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables' + export XCFLAGS + PKG_CONFIG_ALLOW_SYSTEM_LIBS=1 + PKG_CONFIG_ALLOW_SYSTEM_CFLAGS=1 + export PKG_CONFIG_ALLOW_SYSTEM_LIBS + export PKG_CONFIG_ALLOW_SYSTEM_CFLAGS ++ /usr/bin/pkg-config --cflags-only-I nspr ++ sed s/-I// + NSPR_INCLUDE_DIR='/usr/include/nspr4 ' + NSPR_LIB_DIR=/usr/lib + export NSPR_INCLUDE_DIR + export NSPR_LIB_DIR ++ /usr/bin/pkg-config --cflags-only-I nss-softokn ++ sed s/-I// + export 'FREEBL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + FREEBL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export FREEBL_LIB_DIR=/usr/lib + FREEBL_LIB_DIR=/usr/lib + export USE_SYSTEM_FREEBL=1 + USE_SYSTEM_FREEBL=1 + export NO_SHA224_AVAILABLE=1 + NO_SHA224_AVAILABLE=1 + NSS_USE_SYSTEM_SQLITE=1 + export NSS_USE_SYSTEM_SQLITE + unset NSS_ENABLE_ECC + /usr/bin/make -C ./mozilla/security/coreconf make: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf' cd nsinstall; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf/nsinstall' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf/nsinstall' cd nsinstall; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf/nsinstall' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables nsinstall.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pathsub.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pathsub.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pathsub.o -lpthread -ldl -lc true -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf/nsinstall' make: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf' + /usr/bin/make -C ./mozilla/security/dbm make: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm' cd include; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/include' Creating ../../../dist/public/dbm ../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ../../../dbm/include/cdefs.h ../../../dbm/include/mcom_db.h ../../../dbm/include/ncompat.h ../../../dbm/include/winfile.h ../../../dist/public/dbm make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/include' cd src; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/src' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/src' cd include; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/include' make[1]: Nothing to be done for `libs'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/include' cd src; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/src' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/db.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ../../../dbm/src/db.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/h_bigkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ../../../dbm/src/h_bigkey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/h_func.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ../../../dbm/src/h_func.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/h_log2.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ../../../dbm/src/h_log2.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/h_page.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ../../../dbm/src/h_page.c ../../../dbm/src/h_page.c: In function 'new_lseek': ../../../dbm/src/h_page.c:165: warning: ignoring return value of 'write', declared with attribute warn_unused_result ../../../dbm/src/h_page.c: In function 'overflow_page': ../../../dbm/src/h_page.c:1002: warning: ignoring return value of 'write', declared with attribute warn_unused_result ../../../dbm/src/h_page.c:1017: warning: ignoring return value of 'write', declared with attribute warn_unused_result ../../../dbm/src/h_page.c:1043: warning: ignoring return value of 'write', declared with attribute warn_unused_result gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/hash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ../../../dbm/src/hash.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/hash_buf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ../../../dbm/src/hash_buf.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/mktemp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ../../../dbm/src/mktemp.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dirent.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables dirent.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libdbm.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libdbm.a Linux2.6_x86_glibc_PTH_OPT.OBJ/db.o Linux2.6_x86_glibc_PTH_OPT.OBJ/h_bigkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/h_func.o Linux2.6_x86_glibc_PTH_OPT.OBJ/h_log2.o Linux2.6_x86_glibc_PTH_OPT.OBJ/h_page.o Linux2.6_x86_glibc_PTH_OPT.OBJ/hash.o Linux2.6_x86_glibc_PTH_OPT.OBJ/hash_buf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/mktemp.o Linux2.6_x86_glibc_PTH_OPT.OBJ/dirent.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libdbm.a ../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libdbm.a ../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/src' make: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm' make: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss' cd lib; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib' cd util; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/util' Creating ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 base64.h ciferfam.h nssb64.h nssb64t.h nsslocks.h nssilock.h nssilckt.h nssrwlk.h nssrwlkt.h nssutil.h pkcs11.h pkcs11f.h pkcs11p.h pkcs11t.h pkcs11n.h pkcs11u.h portreg.h secasn1.h secasn1t.h seccomon.h secder.h secdert.h secdig.h secdigt.h secitem.h secoid.h secoidt.h secport.h secerr.h utilrename.h ../../../../dist/public/nss Creating ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 templates.c ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/util' cd freebl; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 blapit.h shsign.h ecl/ecl-exp.h hasht.h sechash.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 alghmac.h blapi.h secmpi.h secrng.h ec.h ecl/ecl.h ecl/ecl-curve.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' cd softoken; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken' cd legacydb; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodt.h ../../../../dist/public/nss cd legacydb; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 lgglue.h lowkeyi.h lowkeyti.h pk11pars.h pkcs11ni.h softoken.h softoknt.h softkver.h sdb.h sftkdbt.h pk11init.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken' cd base; /usr/bin/make export + /usr/bin/make -C ./mozilla/security/nss make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/base' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 baset.h base.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/base' cd dev; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/dev' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/dev' cd pki; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pki' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pki' cd libpkix; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix' cd include; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd include; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix' cd certdb; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certdb' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certdb' cd certhigh; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certhigh' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certhigh' cd pk11wrap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pk11wrap' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmod.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/cryptohi' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h ../../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/cryptohi' cd nss; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/nss' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/nss' cd ssl; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ssl' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h ../../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ssl' cd pkcs12; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs12' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs12' cd pkcs7; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs7' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs7' cd smime; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/smime' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/smime' cd crmf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/crmf' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/crmf' cd jar; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/jar' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/jar' cd ckfw; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw' cd builtins; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nsspem.h ../../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h ../../../../dist/public/nss cd builtins; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw' cd sysinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/sysinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib' cd cmd; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd' cd lib; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/lib' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secutil.h pk11table.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/lib' cd addbuiltin; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/addbuiltin' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/addbuiltin' cd atob; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/atob' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/atob' cd bltest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/bltest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/bltest' cd btoa; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/btoa' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/btoa' cd certcgi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certcgi' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certcgi' cd certutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certutil' cd checkcert; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/checkcert' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/checkcert' cd chktest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/chktest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/chktest' cd crlutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crlutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crlutil' cd crmftest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crmftest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crmftest' cd dbtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/dbtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/dbtest' cd derdump; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/derdump' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/derdump' cd digest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/digest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/digest' cd makepqg; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/makepqg' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/makepqg' cd multinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/multinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/multinit' cd ocspclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ocspclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ocspclnt' cd oidcalc; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/oidcalc' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/oidcalc' cd p7content; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7content' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7content' cd p7env; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7env' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7env' cd p7sign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7sign' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7sign' cd p7verify; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7verify' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7verify' cd pk12util; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk12util' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk12util' cd pk11mode; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk11mode' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk11mode' cd pp; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pp' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pp' cd rsaperf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/rsaperf' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/sdrtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/sdrtest' cd selfserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/selfserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/selfserv' cd signtool; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signtool' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signtool' cd signver; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signver' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signver' cd shlibsign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign' cd mangle; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/mangle' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/mangle' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign' cd smimetools; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/smimetools' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/smimetools' cd ssltap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ssltap' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ssltap' cd strsclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/strsclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/symkeyutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/symkeyutil' cd tests; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tests' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tests' cd tstclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tstclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tstclnt' cd vfychain; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfychain' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfychain' cd vfyserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfyserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfyserv' cd modutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/modutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd' cd lib; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib' cd util; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/util' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/quickder.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables quickder.c quickder.c: In function 'DecodeItem': quickder.c:637: warning: 'mark.type' may be used uninitialized in this function quickder.c:637: warning: 'mark.data' may be used uninitialized in this function quickder.c:637: warning: 'mark.len' may be used uninitialized in this function gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secdig.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables secdig.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/derdec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables derdec.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/derenc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables derenc.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dersubr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables dersubr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dertime.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables dertime.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/errstrs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables errstrs.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssb64d.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables nssb64d.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssb64e.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables nssb64e.c nssb64e.c: In function 'NSSBase64_EncodeItem_Util': nssb64e.c:669: warning: 'out_len' may be used uninitialized in this function gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssrwlk.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables nssrwlk.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssilock.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables nssilock.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/oidstring.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables oidstring.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/portreg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables portreg.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secalgid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables secalgid.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1d.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables secasn1d.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1e.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables secasn1e.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1u.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables secasn1u.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secitem.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables secitem.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secload.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables secload.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secoid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables secoid.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sectime.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sectime.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secport.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables secport.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/templates.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables templates.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/utf8.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables utf8.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil.a Linux2.6_x86_glibc_PTH_OPT.OBJ/quickder.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secdig.o Linux2.6_x86_glibc_PTH_OPT.OBJ/derdec.o Linux2.6_x86_glibc_PTH_OPT.OBJ/derenc.o Linux2.6_x86_glibc_PTH_OPT.OBJ/dersubr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/dertime.o Linux2.6_x86_glibc_PTH_OPT.OBJ/errstrs.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssb64d.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssb64e.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssrwlk.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssilock.o Linux2.6_x86_glibc_PTH_OPT.OBJ/oidstring.o Linux2.6_x86_glibc_PTH_OPT.OBJ/portreg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secalgid.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1d.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1e.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1u.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secitem.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secload.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secoid.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sectime.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secport.o Linux2.6_x86_glibc_PTH_OPT.OBJ/templates.o Linux2.6_x86_glibc_PTH_OPT.OBJ/utf8.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil.a grep -v ';-' nssutil.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/nssutil.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnssutil3.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/nssutil.def -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil3.so Linux2.6_x86_glibc_PTH_OPT.OBJ/quickder.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secdig.o Linux2.6_x86_glibc_PTH_OPT.OBJ/derdec.o Linux2.6_x86_glibc_PTH_OPT.OBJ/derenc.o Linux2.6_x86_glibc_PTH_OPT.OBJ/dersubr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/dertime.o Linux2.6_x86_glibc_PTH_OPT.OBJ/errstrs.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssb64d.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssb64e.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssrwlk.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssilock.o Linux2.6_x86_glibc_PTH_OPT.OBJ/oidstring.o Linux2.6_x86_glibc_PTH_OPT.OBJ/portreg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secalgid.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1d.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1e.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1u.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secitem.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secload.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secoid.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sectime.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secport.o Linux2.6_x86_glibc_PTH_OPT.OBJ/templates.o Linux2.6_x86_glibc_PTH_OPT.OBJ/utf8.o -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil3.so ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/util' cd freebl; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/loader.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables loader.c loader.c: In function 'BL_Unload': loader.c:934: warning: unused variable 'status' rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libfreebl.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libfreebl.a Linux2.6_x86_glibc_PTH_OPT.OBJ/loader.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libfreebl.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libfreebl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib mkdir Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB /usr/bin/make FREEBL_CHILD_BUILD=1 \ OBJDIR=Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables freeblver.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ldvector.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sysrand.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sha_fast.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables md2.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables md5.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sha512.c sha512.c: In function 'SHA512_Compress': sha512.c:925: warning: unused variable 't1' sha512.c:947: warning: unused variable 't2' sha512.c:947: warning: unused variable 't1' sha512.c: In function 'SHA512_End': sha512.c:1221: warning: unused variable 't1' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables alghmac.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables rawhash.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables alg2268.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables arcfour.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables arcfive.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables desblapi.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables des.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables drbg.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables rijndael.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables aeskeywrap.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables camellia.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables dh.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ec.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pqg.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables dsa.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables rsa.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables shvfy.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables tlsprfalg.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables seed.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables jpake.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables mpi/mpprime.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables mpi/mpmontg.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables mpi/mplogic.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables mpi/mpi.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables mpi/mp_gf2m.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables mpi/mpcpucache.c mpi/mpcpucache.c: In function 's_mpi_is_sse2': mpi/mpcpucache.c:667: warning: dereferencing type-punned pointer will break strict-aliasing rules mpi/mpcpucache.c: In function 's_mpi_getProcessorLineSize': mpi/mpcpucache.c:714: warning: dereferencing type-punned pointer will break strict-aliasing rules gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables stubs.c stubs.c: In function 'PR_Seek_stub': stubs.c:353: warning: enumeration value 'PR_SEEK_SET' not handled in switch gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_x86.o -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables -c mpi/mpi_x86.s grep -v ';-' freebl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libfreebl3.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def -Wl,-Bsymbolic -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_x86.o -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' cd softoken; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ecdecode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecdecode.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipsaudt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables fipsaudt.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipstest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables fipstest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipstokn.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables fipstokn.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgglue.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables lgglue.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables lowkey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowpbe.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables lowpbe.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/padbuf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables padbuf.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkcs11.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11c.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkcs11c.c pkcs11c.c: In function 'NSC_DeriveKey': pkcs11c.c:6265: warning: passing argument 3 of 'sftk_forceAttribute' discards qualifiers from pointer target type pkcs11i.h:638: note: expected 'void *' but argument is of type 'const CK_BYTE *' pkcs11c.c: In function 'NSC_GenerateKey': pkcs11c.c:3257: warning: 'hashType' may be used uninitialized in this function gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11u.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkcs11u.c pkcs11u.c: In function 'sftk_DeleteObject': pkcs11u.c:1210: warning: unused variable 'to' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/rsawrapr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables rsawrapr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sdb.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sftkdb.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkmod.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sftkmod.c sftkmod.c: In function 'sftkdb_DeleteSecmodDB': sftkmod.c:640: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result sftkmod.c: In function 'sftkdb_AddSecmodDB': sftkmod.c:749: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result sftkmod.c: In function 'sftkdb_DeleteSecmodDB': sftkmod.c:561: warning: 'name_len' may be used uninitialized in this function sftkmod.c:561: warning: 'lib_len' may be used uninitialized in this function gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkpars.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sftkpars.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkpwd.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sftkpwd.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/softkver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables softkver.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/tlsprf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables tlsprf.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/jpakesftk.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables jpakesftk.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn.a Linux2.6_x86_glibc_PTH_OPT.OBJ/ecdecode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipsaudt.o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipstest.o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipstokn.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgglue.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowpbe.o Linux2.6_x86_glibc_PTH_OPT.OBJ/padbuf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11c.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11u.o Linux2.6_x86_glibc_PTH_OPT.OBJ/rsawrapr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sdb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkdb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkmod.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkpars.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkpwd.o Linux2.6_x86_glibc_PTH_OPT.OBJ/softkver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/tlsprf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/jpakesftk.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn.a grep -v ';-' softokn.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/softokn.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libsoftokn3.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/softokn.def -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so Linux2.6_x86_glibc_PTH_OPT.OBJ/ecdecode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipsaudt.o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipstest.o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipstokn.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgglue.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowpbe.o Linux2.6_x86_glibc_PTH_OPT.OBJ/padbuf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11c.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11u.o Linux2.6_x86_glibc_PTH_OPT.OBJ/rsawrapr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sdb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkdb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkmod.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkpars.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkpwd.o Linux2.6_x86_glibc_PTH_OPT.OBJ/softkver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/tlsprf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/jpakesftk.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib cd legacydb; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dbmshim.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables dbmshim.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/keydb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables keydb.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgattr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables lgattr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgcreate.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables lgcreate.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgdestroy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables lgdestroy.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgfind.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables lgfind.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lginit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables lginit.c lginit.c: In function 'legacy_Open': lginit.c:643: warning: 'certdbPtr' may be used uninitialized in this function gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables lgutil.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowcert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables lowcert.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables lowkey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pcertdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pcertdb.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11db.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11db.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm.a Linux2.6_x86_glibc_PTH_OPT.OBJ/dbmshim.o Linux2.6_x86_glibc_PTH_OPT.OBJ/keydb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgattr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgcreate.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgdestroy.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgfind.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lginit.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowcert.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pcertdb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11db.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm.a grep -v ';-' nssdbm.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/nssdbm.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnssdbm3.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/nssdbm.def -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so Linux2.6_x86_glibc_PTH_OPT.OBJ/dbmshim.o Linux2.6_x86_glibc_PTH_OPT.OBJ/keydb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgattr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgcreate.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgdestroy.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgfind.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lginit.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowcert.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pcertdb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11db.o ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a -L../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -L../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm.a ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken' cd base; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/base' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/arena.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables arena.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/error.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables error.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/errorval.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables errorval.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/hashops.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables hashops.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables libc.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/tracker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables tracker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/item.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables item.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/utf8.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables utf8.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/list.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables list.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/hash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables hash.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssb.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssb.a Linux2.6_x86_glibc_PTH_OPT.OBJ/arena.o Linux2.6_x86_glibc_PTH_OPT.OBJ/error.o Linux2.6_x86_glibc_PTH_OPT.OBJ/errorval.o Linux2.6_x86_glibc_PTH_OPT.OBJ/hashops.o Linux2.6_x86_glibc_PTH_OPT.OBJ/libc.o Linux2.6_x86_glibc_PTH_OPT.OBJ/tracker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/item.o Linux2.6_x86_glibc_PTH_OPT.OBJ/utf8.o Linux2.6_x86_glibc_PTH_OPT.OBJ/list.o Linux2.6_x86_glibc_PTH_OPT.OBJ/hash.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssb.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/base' cd dev; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/dev' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/devslot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables devslot.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/devtoken.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables devtoken.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/devutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables devutil.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ckhelper.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ckhelper.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdev.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdev.a Linux2.6_x86_glibc_PTH_OPT.OBJ/devslot.o Linux2.6_x86_glibc_PTH_OPT.OBJ/devtoken.o Linux2.6_x86_glibc_PTH_OPT.OBJ/devutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ckhelper.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdev.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdev.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/dev' cd pki; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pki' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/asymmkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables asymmkey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certificate.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables certificate.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cryptocontext.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cryptocontext.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/symmkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables symmkey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/trustdomain.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables trustdomain.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/tdcache.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables tdcache.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certdecode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables certdecode.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkistore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkistore.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkibase.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkibase.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pki3hack.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pki3hack.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspki.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspki.a Linux2.6_x86_glibc_PTH_OPT.OBJ/asymmkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certificate.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cryptocontext.o Linux2.6_x86_glibc_PTH_OPT.OBJ/symmkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/trustdomain.o Linux2.6_x86_glibc_PTH_OPT.OBJ/tdcache.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certdecode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkistore.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkibase.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pki3hack.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspki.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pki' cd libpkix; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix' cd include; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' make[3]: Nothing to be done for `libs'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_certselector.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_certselector.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_comcertselparams.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcertsel.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_crlselector.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_crlselector.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_comcrlselparams.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_basicconstraintschecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_certchainchecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_crlchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_crlchecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_ekuchecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_expirationchecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_namechainingchecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_nameconstraintschecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_ocspchecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_revocationmethod.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_revocationchecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_policychecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_policychecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_signaturechecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_targetcertchecker.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixchecker.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_trustanchor.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_trustanchor.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_procparams.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_procparams.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_valparams.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_valparams.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_resourcelimits.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixparams.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixparams.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_buildresult.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_buildresult.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_policynode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_policynode.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_valresult.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_valresult.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_verifynode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_verifynode.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixresults.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixresults.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_verifynode.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_store.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_store.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixstore.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixstore.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_store.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_validate.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_validate.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_lifecycle.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_lifecycle.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_build.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_build.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixtop.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixtop.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_validate.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_build.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_tools.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_tools.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_error.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_error.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_logger.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_logger.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_list.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_list.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_errpaths.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_errpaths.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixutil.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixutil.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_tools.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_error.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_logger.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_list.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_errpaths.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_basicconstraints.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_cert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_cert.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_certpolicyinfo.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_certpolicymap.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_certpolicyqualifier.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_crl.c pkix_pl_crl.c: In function 'pkix_pl_CRL_ToString': pkix_pl_crl.c:387: warning: 'crlVersion' may be used uninitialized in this function pkix_pl_crl.c:387: note: 'crlVersion' was declared here gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_crldp.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_crlentry.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_date.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_date.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_generalname.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_infoaccess.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_nameconstraints.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_ocsprequest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_ocspresponse.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_publickey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_x500name.c pkix_pl_x500name.c:70: warning: 'pkix_pl_X500Name_ToString_Helper' defined but not used gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_ocspcertid.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixpki.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixpki.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_bigint.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_bytearray.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_common.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_common.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_error.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_error.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_hashtable.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_lifecycle.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mem.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_mem.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_monitorlock.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_mutex.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_object.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_object.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_oid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_oid.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_primhash.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_rwlock.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_string.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_string.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixsystem.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_string.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_aiamgr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_colcertstore.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_httpcertstore.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_httpdefaultclient.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_ldaptemplates.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_ldapcertstore.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_ldapresponse.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_ldaprequest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_ldapdefaultclient.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_nsscontext.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_pk11certstore.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pkix_pl_socket.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixmodule.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_socket.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix' cd certdb; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certdb' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/alg1485.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables alg1485.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables certdb.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certv3.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables certv3.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certxutl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables certxutl.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables crl.c crl.c: In function 'cert_CheckCertRevocationStatus': crl.c:2722: warning: unused variable 'rv2' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/genname.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables genname.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/stanpcertdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables stanpcertdb.c stanpcertdb.c: In function 'CERT_FindCertByNicknameOrEmailAddr': stanpcertdb.c:711: warning: passing argument 2 of 'common_FindCertByNicknameOrEmailAddrForUsage' discards qualifiers from pointer target type stanpcertdb.c:633: note: expected 'char *' but argument is of type 'const char *' stanpcertdb.c: In function 'CERT_FindCertByNicknameOrEmailAddrForUsage': stanpcertdb.c:721: warning: passing argument 2 of 'common_FindCertByNicknameOrEmailAddrForUsage' discards qualifiers from pointer target type stanpcertdb.c:633: note: expected 'char *' but argument is of type 'const char *' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/polcyxtn.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables polcyxtn.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secname.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables secname.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/xauthkid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables xauthkid.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/xbsconst.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables xbsconst.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/xconst.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables xconst.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libcertdb.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libcertdb.a Linux2.6_x86_glibc_PTH_OPT.OBJ/alg1485.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certdb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certv3.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certxutl.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crl.o Linux2.6_x86_glibc_PTH_OPT.OBJ/genname.o Linux2.6_x86_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/polcyxtn.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secname.o Linux2.6_x86_glibc_PTH_OPT.OBJ/xauthkid.o Linux2.6_x86_glibc_PTH_OPT.OBJ/xbsconst.o Linux2.6_x86_glibc_PTH_OPT.OBJ/xconst.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libcertdb.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libcertdb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certdb' cd certhigh; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certhigh' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certhtml.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables certhtml.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certreq.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables certreq.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crlv2.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables crlv2.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ocsp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ocsp.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certhigh.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables certhigh.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables certvfy.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfypkix.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables certvfypkix.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfypkixprint.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables certvfypkixprint.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/xcrldist.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables xcrldist.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libcerthi.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libcerthi.a Linux2.6_x86_glibc_PTH_OPT.OBJ/certhtml.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certreq.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crlv2.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ocsp.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certhigh.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfy.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfypkix.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfypkixprint.o Linux2.6_x86_glibc_PTH_OPT.OBJ/xcrldist.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libcerthi.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certhigh' cd pk11wrap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pk11wrap' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dev3hack.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables dev3hack.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11akey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11akey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11auth.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11auth.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11cert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11cert.c pk11cert.c: In function 'PK11_IsUserCert': pk11cert.c:177: warning: enumeration value 'rsaPssKey' not handled in switch pk11cert.c:177: warning: enumeration value 'rsaOaepKey' not handled in switch pk11cert.c: In function 'PK11_FindCertFromDERCertItem': pk11cert.c:2170: warning: unused variable 'td' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11cxt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11cxt.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11err.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11err.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11kea.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11kea.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11list.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11list.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11load.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11load.c pk11load.c: In function 'SECMOD_UnloadModule': pk11load.c:600: warning: unused variable 'status' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11mech.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11mech.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11merge.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11merge.c pk11merge.c: In function 'pk11_mergeByObjectIDs': pk11merge.c:1259: warning: 'error' may be used uninitialized in this function pk11merge.c: In function 'PK11_MergeTokens': pk11merge.c:1323: warning: 'error' may be used uninitialized in this function gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11nobj.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11nobj.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11obj.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11obj.c pk11obj.c: In function 'PK11_WriteRawAttribute': pk11obj.c:1389: warning: 'handle' may be used uninitialized in this function pk11obj.c: In function 'PK11_ReadRawAttribute': pk11obj.c:1442: warning: 'handle' may be used uninitialized in this function gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pars.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11pars.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pbe.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11pbe.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pk12.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11pk12.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pqg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11pqg.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11sdr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11sdr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11skey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11skey.c pk11skey.c: In function 'pk11_TokenKeyGenWithFlagsAndKeyType': pk11skey.c:923: warning: unused variable 'isToken' pk11skey.c:919: warning: unused variable 'crv' pk11skey.c:917: warning: unused variable 'session' pk11skey.c: In function 'PK11_PubDerive': pk11skey.c:1601: warning: enumeration value 'rsaPssKey' not handled in switch pk11skey.c:1601: warning: enumeration value 'rsaOaepKey' not handled in switch gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11slot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11slot.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11util.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11util.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpk11wrap.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux2.6_x86_glibc_PTH_OPT.OBJ/dev3hack.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11akey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11auth.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11cert.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11cxt.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11err.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11kea.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11list.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11load.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11mech.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11merge.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11nobj.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11obj.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pars.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pbe.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pk12.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pqg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11sdr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11skey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11slot.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11util.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/cryptohi' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sechash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sechash.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/seckey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables seckey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secsign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables secsign.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secvfy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables secvfy.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dsautil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables dsautil.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libcryptohi.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libcryptohi.a Linux2.6_x86_glibc_PTH_OPT.OBJ/sechash.o Linux2.6_x86_glibc_PTH_OPT.OBJ/seckey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secsign.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secvfy.o Linux2.6_x86_glibc_PTH_OPT.OBJ/dsautil.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libcryptohi.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libcryptohi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/cryptohi' cd nss; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/nss' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssinit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables nssinit.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables nssver.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/utilwrap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables utilwrap.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss.a Linux2.6_x86_glibc_PTH_OPT.OBJ/nssinit.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/utilwrap.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss.a grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/nss.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnss3.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/nss.def -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss3.so Linux2.6_x86_glibc_PTH_OPT.OBJ/nssinit.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/utilwrap.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/certhtml.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/certreq.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/crlv2.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/ocsp.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/certhigh.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfy.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfypkix.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfypkixprint.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/xcrldist.o ../cryptohi/Linux2.6_x86_glibc_PTH_OPT.OBJ/sechash.o ../cryptohi/Linux2.6_x86_glibc_PTH_OPT.OBJ/seckey.o ../cryptohi/Linux2.6_x86_glibc_PTH_OPT.OBJ/secsign.o ../cryptohi/Linux2.6_x86_glibc_PTH_OPT.OBJ/secvfy.o ../cryptohi/Linux2.6_x86_glibc_PTH_OPT.OBJ/dsautil.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/dev3hack.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11akey.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11auth.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11cert.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11err.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11kea.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11list.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11load.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11mech.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11merge.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11obj.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pars.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11skey.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11slot.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11util.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/alg1485.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/certdb.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/certv3.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/certxutl.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/crl.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/genname.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/stanpcertdb.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/polcyxtn.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/secname.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/xauthkid.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/xbsconst.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/xconst.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/asymmkey.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/certificate.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/cryptocontext.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/symmkey.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/trustdomain.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/tdcache.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/certdecode.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkistore.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkibase.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pki3hack.o ../dev/Linux2.6_x86_glibc_PTH_OPT.OBJ/devslot.o ../dev/Linux2.6_x86_glibc_PTH_OPT.OBJ/devtoken.o ../dev/Linux2.6_x86_glibc_PTH_OPT.OBJ/devutil.o ../dev/Linux2.6_x86_glibc_PTH_OPT.OBJ/ckhelper.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/arena.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/error.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/errorval.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/hashops.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/libc.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/tracker.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/item.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/utf8.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/list.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss3.so ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/nss' cd ssl; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ssl' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/derive.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables derive.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/prelib.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables prelib.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3con.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ssl3con.c ssl3con.c: In function 'ssl3_FinishHandshake': ssl3con.c:8615: warning: unused variable 'rv' ssl3con.c: At top level: ssl3con.c:758: warning: 'anyRestrictedEnabled' defined but not used gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3gthr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ssl3gthr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslauth.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sslauth.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslcon.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sslcon.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssldef.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ssldef.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslenum.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sslenum.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslerr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sslerr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslerrstrs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sslerrstrs.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslinit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sslinit.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3ext.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ssl3ext.c ssl3ext.c: In function 'ssl3_ServerHandleSessionTicketXtn': ssl3ext.c:1039: warning: 'aes_key_pkcs11' may be used uninitialized in this function ssl3ext.c:1040: warning: 'mac_key_pkcs11' may be used uninitialized in this function ssl3ext.c: In function 'ssl3_SendNewSessionTicket': ssl3ext.c:685: warning: 'aes_key_pkcs11' may be used uninitialized in this function ssl3ext.c:686: warning: 'mac_key_pkcs11' may be used uninitialized in this function gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslgathr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sslgathr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslmutex.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sslmutex.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslnonce.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sslnonce.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslreveal.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sslreveal.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsecur.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sslsecur.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsnce.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sslsnce.c sslsnce.c: In function 'InitCache': sslsnce.c:1257: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1258: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1259: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1260: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1261: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1262: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1263: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1264: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1265: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1266: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1267: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1268: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1269: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c: In function 'SSL_InheritMPServerSIDCacheInstance': sslsnce.c:1609: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1610: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1611: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1612: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1613: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1614: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1615: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1616: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1617: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1618: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1619: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1620: warning: dereferencing type-punned pointer will break strict-aliasing rules sslsnce.c:1621: warning: dereferencing type-punned pointer will break strict-aliasing rules gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsock.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sslsock.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssltrace.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ssltrace.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sslver.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/authcert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables authcert.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmpcert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmpcert.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nsskea.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables nsskea.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslinfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sslinfo.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3ecc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ssl3ecc.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/unix_err.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables unix_err.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl.a Linux2.6_x86_glibc_PTH_OPT.OBJ/derive.o Linux2.6_x86_glibc_PTH_OPT.OBJ/prelib.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3con.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslauth.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslcon.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssldef.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslenum.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslerr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslinit.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3ext.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslgathr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslmutex.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslnonce.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslreveal.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsecur.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsnce.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsock.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssltrace.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/authcert.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmpcert.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nsskea.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslinfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux2.6_x86_glibc_PTH_OPT.OBJ/unix_err.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl.a grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libssl3.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl.def -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl3.so Linux2.6_x86_glibc_PTH_OPT.OBJ/derive.o Linux2.6_x86_glibc_PTH_OPT.OBJ/prelib.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3con.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslauth.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslcon.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssldef.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslenum.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslerr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslinit.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3ext.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslgathr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslmutex.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslnonce.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslreveal.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsecur.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsnce.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsock.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssltrace.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/authcert.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmpcert.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nsskea.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslinfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux2.6_x86_glibc_PTH_OPT.OBJ/unix_err.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl3.so ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ssl' cd pkcs12; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs12' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12local.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables p12local.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12creat.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables p12creat.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12dec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables p12dec.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12plcy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables p12plcy.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12tmpl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables p12tmpl.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12e.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables p12e.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12d.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables p12d.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs12.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs12.a Linux2.6_x86_glibc_PTH_OPT.OBJ/p12local.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12creat.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12dec.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12plcy.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12tmpl.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12e.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12d.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs12.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs12.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs12' cd pkcs7; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs7' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certread.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables certread.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7common.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables p7common.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7create.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables p7create.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7decode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables p7decode.c p7decode.c: In function 'sec_pkcs7_decoder_get_recipient_key': p7decode.c:443: warning: unused variable 'bulkLength' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7encode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables p7encode.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7local.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables p7local.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secmime.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables secmime.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs7.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs7.a Linux2.6_x86_glibc_PTH_OPT.OBJ/certread.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7common.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7create.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7decode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7encode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7local.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secmime.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs7.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs7.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs7' cd smime; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/smime' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsarray.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmsarray.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsasn1.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmsasn1.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsattr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmsattr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmscinfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmscinfo.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmscipher.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmscipher.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdecode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmsdecode.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdigdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmsdigdata.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdigest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmsdigest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsencdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmsencdata.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsencode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmsencode.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsenvdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmsenvdata.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsmessage.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmsmessage.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmspubkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmspubkey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsrecinfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmsrecinfo.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsreclist.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmsreclist.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmssigdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmssigdata.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmssiginfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmssiginfo.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsudf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmsudf.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmsutil.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimemessage.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables smimemessage.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimeutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables smimeutil.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimever.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables smimever.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime.a Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsarray.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsasn1.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsattr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmscinfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmscipher.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdecode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdigest.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsencdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsencode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsmessage.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmspubkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsreclist.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmssigdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsudf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimemessage.o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimeutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimever.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime.a grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/smime.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libsmime3.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/smime.def -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime3.so Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsarray.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsasn1.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsattr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmscinfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmscipher.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdecode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdigest.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsencdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsencode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsmessage.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmspubkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsreclist.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmssigdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsudf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimemessage.o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimeutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimever.o ../pkcs12/Linux2.6_x86_glibc_PTH_OPT.OBJ/p12local.o ../pkcs12/Linux2.6_x86_glibc_PTH_OPT.OBJ/p12creat.o ../pkcs12/Linux2.6_x86_glibc_PTH_OPT.OBJ/p12dec.o ../pkcs12/Linux2.6_x86_glibc_PTH_OPT.OBJ/p12plcy.o ../pkcs12/Linux2.6_x86_glibc_PTH_OPT.OBJ/p12tmpl.o ../pkcs12/Linux2.6_x86_glibc_PTH_OPT.OBJ/p12e.o ../pkcs12/Linux2.6_x86_glibc_PTH_OPT.OBJ/p12d.o ../pkcs7/Linux2.6_x86_glibc_PTH_OPT.OBJ/certread.o ../pkcs7/Linux2.6_x86_glibc_PTH_OPT.OBJ/p7common.o ../pkcs7/Linux2.6_x86_glibc_PTH_OPT.OBJ/p7create.o ../pkcs7/Linux2.6_x86_glibc_PTH_OPT.OBJ/p7decode.o ../pkcs7/Linux2.6_x86_glibc_PTH_OPT.OBJ/p7encode.o ../pkcs7/Linux2.6_x86_glibc_PTH_OPT.OBJ/p7local.o ../pkcs7/Linux2.6_x86_glibc_PTH_OPT.OBJ/secmime.o -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime3.so ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/smime' cd crmf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/crmf' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfenc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables crmfenc.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmftmpl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables crmftmpl.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfreq.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables crmfreq.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfpop.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables crmfpop.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfdec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables crmfdec.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfget.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables crmfget.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfcont.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables crmfcont.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmmfasn1.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmmfasn1.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmmfresp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmmfresp.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmmfrec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmmfrec.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmmfchal.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmmfchal.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/servget.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables servget.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/encutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables encutil.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/respcli.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables respcli.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/respcmn.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables respcmn.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/challcli.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables challcli.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/asn1cmn.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables asn1cmn.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libcrmf.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libcrmf.a Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfenc.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmftmpl.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfreq.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfpop.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfdec.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfget.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfcont.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmmfresp.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmmfrec.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmmfchal.o Linux2.6_x86_glibc_PTH_OPT.OBJ/servget.o Linux2.6_x86_glibc_PTH_OPT.OBJ/encutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/respcli.o Linux2.6_x86_glibc_PTH_OPT.OBJ/respcmn.o Linux2.6_x86_glibc_PTH_OPT.OBJ/challcli.o Linux2.6_x86_glibc_PTH_OPT.OBJ/asn1cmn.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libcrmf.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libcrmf.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/crmf' cd jar; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/jar' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/jarver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables jarver.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/jarsign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables jarsign.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/jar.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables jar.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/jar-ds.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables jar-ds.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/jarfile.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables jarfile.c jarfile.c: In function 'jar_listzip': jarfile.c:722: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:726: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:727: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:749: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:754: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:755: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:793: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:816: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:817: warning: dereferencing type-punned pointer will break strict-aliasing rules jarfile.c:818: warning: dereferencing type-punned pointer will break strict-aliasing rules gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/jarint.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables jarint.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libjar.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libjar.a Linux2.6_x86_glibc_PTH_OPT.OBJ/jarver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/jarsign.o Linux2.6_x86_glibc_PTH_OPT.OBJ/jar.o Linux2.6_x86_glibc_PTH_OPT.OBJ/jar-ds.o Linux2.6_x86_glibc_PTH_OPT.OBJ/jarfile.o Linux2.6_x86_glibc_PTH_OPT.OBJ/jarint.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libjar.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libjar.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/jar' cd ckfw; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crypto.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables crypto.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/find.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables find.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/hash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables hash.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/instance.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables instance.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/mutex.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables mutex.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/object.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables object.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/session.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables session.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sessobj.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sessobj.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/slot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables slot.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/token.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables token.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/wrap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables wrap.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/mechanism.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables mechanism.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckfw.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckfw.a Linux2.6_x86_glibc_PTH_OPT.OBJ/crypto.o Linux2.6_x86_glibc_PTH_OPT.OBJ/find.o Linux2.6_x86_glibc_PTH_OPT.OBJ/hash.o Linux2.6_x86_glibc_PTH_OPT.OBJ/instance.o Linux2.6_x86_glibc_PTH_OPT.OBJ/mutex.o Linux2.6_x86_glibc_PTH_OPT.OBJ/object.o Linux2.6_x86_glibc_PTH_OPT.OBJ/session.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sessobj.o Linux2.6_x86_glibc_PTH_OPT.OBJ/slot.o Linux2.6_x86_glibc_PTH_OPT.OBJ/token.o Linux2.6_x86_glibc_PTH_OPT.OBJ/wrap.o Linux2.6_x86_glibc_PTH_OPT.OBJ/mechanism.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib cd builtins; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/anchor.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables anchor.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/constants.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables constants.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/bfind.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables bfind.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/binst.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables binst.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/bobject.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables bobject.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/bsession.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables bsession.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/bslot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables bslot.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/btoken.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables btoken.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables certdata.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ckbiver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ckbiver.c grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/nssckbi.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckbi.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnssckbi.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/nssckbi.def -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckbi.so Linux2.6_x86_glibc_PTH_OPT.OBJ/anchor.o Linux2.6_x86_glibc_PTH_OPT.OBJ/constants.o Linux2.6_x86_glibc_PTH_OPT.OBJ/bfind.o Linux2.6_x86_glibc_PTH_OPT.OBJ/binst.o Linux2.6_x86_glibc_PTH_OPT.OBJ/bobject.o Linux2.6_x86_glibc_PTH_OPT.OBJ/bsession.o Linux2.6_x86_glibc_PTH_OPT.OBJ/bslot.o Linux2.6_x86_glibc_PTH_OPT.OBJ/btoken.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ckbiver.o ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/anchor.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables anchor.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/constants.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables constants.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pargs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pargs.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pfind.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pfind.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pinst.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pinst.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pobject.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pobject.c pobject.c: In function 'pem_DestroyInternalObject': pobject.c:588: warning: enumeration value 'pemAll' not handled in switch gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/prsa.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables prsa.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/psession.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables psession.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pslot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pslot.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ptoken.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ptoken.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ckpemver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ckpemver.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/rsawrapr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables rsawrapr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/util.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables util.c grep -v ';-' nsspem.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/nsspem.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspem.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnsspem.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/nsspem.def -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspem.so Linux2.6_x86_glibc_PTH_OPT.OBJ/anchor.o Linux2.6_x86_glibc_PTH_OPT.OBJ/constants.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pargs.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pfind.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pinst.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pobject.o Linux2.6_x86_glibc_PTH_OPT.OBJ/prsa.o Linux2.6_x86_glibc_PTH_OPT.OBJ/psession.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pslot.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ptoken.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ckpemver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/rsawrapr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/util.o ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -L../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -lfreebl3 -L../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssckfw -lnssb -lplc4 -lplds4 -L../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -lfreebl3 -lsoftokn3 -lpthread -ldl -lc -lfreebl3 chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspem.so ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspem.so ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw' cd sysinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/sysinit' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nsssysinit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables nsssysinit.c ../../../../dist/private/nss/pk11pars.h:246: warning: 'secmod_argParseModuleSpec' defined but not used ../../../../dist/private/nss/pk11pars.h:327: warning: 'secmod_argSetNewCipherFlags' defined but not used ../../../../dist/private/nss/pk11pars.h:499: warning: 'secmod_argParseSlotInfo' defined but not used ../../../../dist/private/nss/pk11pars.h:756: warning: 'secmod_mkSlotString' defined but not used ../../../../dist/private/nss/pk11pars.h:793: warning: 'secmod_mkNSS' defined but not used ../../../../dist/private/nss/pk11pars.h:854: warning: 'secmod_mkNewModuleSpec' defined but not used rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux2.6_x86_glibc_PTH_OPT.OBJ/nsssysinit.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.a rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnsssysinit.so -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.so Linux2.6_x86_glibc_PTH_OPT.OBJ/nsssysinit.o -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib' cd cmd; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd' cd lib; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/lib' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables secutil.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secpwd.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables secpwd.c secpwd.c: In function 'SEC_GetPassword': secpwd.c:109: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/derprint.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables derprint.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/moreoids.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables moreoids.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pppolicy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pppolicy.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ffs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ffs.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11table.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11table.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libsectool.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libsectool.a Linux2.6_x86_glibc_PTH_OPT.OBJ/secutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secpwd.o Linux2.6_x86_glibc_PTH_OPT.OBJ/derprint.o Linux2.6_x86_glibc_PTH_OPT.OBJ/moreoids.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pppolicy.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ffs.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11table.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libsectool.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsectool.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/lib' cd addbuiltin; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/addbuiltin' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/addbuiltin.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables addbuiltin.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/addbuiltin -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/addbuiltin.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/addbuiltin ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/addbuiltin' cd atob; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/atob' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/atob.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables atob.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/atob -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/atob.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/atob ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/atob' cd bltest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/bltest' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/blapitest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables blapitest.c blapitest.c: In function 'setupIO': blapitest.c:904: warning: pointer targets in assignment differ in signedness blapitest.c: In function 'finishIO': blapitest.c:982: warning: pointer targets in passing argument 2 of 'char2_from_hex' differ in signedness blapitest.c:332: note: expected 'unsigned char *' but argument is of type 'char *' blapitest.c:992: warning: pointer targets in passing argument 2 of 'char2_from_hex' differ in signedness blapitest.c:332: note: expected 'unsigned char *' but argument is of type 'char *' blapitest.c: In function 'bltest_camellia_init': blapitest.c:1376: warning: unused variable 'blocklen' blapitest.c: In function 'cipherDoOp': blapitest.c:2396: warning: pointer targets in passing argument 3 of 'cipherInfo->cipher.symmkeyCipher' differ in signedness blapitest.c:2396: note: expected 'unsigned int *' but argument is of type 'int *' blapitest.c:2407: warning: pointer targets in passing argument 3 of 'cipherInfo->cipher.symmkeyCipher' differ in signedness blapitest.c:2407: note: expected 'unsigned int *' but argument is of type 'int *' blapitest.c:2422: warning: pointer targets in passing argument 3 of 'cipherInfo->cipher.symmkeyCipher' differ in signedness blapitest.c:2422: note: expected 'unsigned int *' but argument is of type 'int *' blapitest.c: In function 'main': blapitest.c:3598: warning: 'ret' may be used uninitialized in this function blapitest.c:3491: warning: 'cipherInfo' may be used uninitialized in this function blapitest.c:3488: warning: 'totalTime' may be used uninitialized in this function gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/bltest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/blapitest.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/bltest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/bltest' cd btoa; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/btoa' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/btoa.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables btoa.c btoa.c: In function 'encode_file': btoa.c:110: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/btoa -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/btoa.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/btoa ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/btoa' cd certcgi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certcgi' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certcgi.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables certcgi.c certcgi.c: In function 'get_serial_number': certcgi.c:626: warning: this decimal constant is unsigned only in ISO C90 certcgi.c:622: warning: ignoring return value of 'fread', declared with attribute warn_unused_result certcgi.c:635: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result certcgi.c:646: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result certcgi.c: In function 'main': certcgi.c:2389: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result certcgi.c: At top level: certcgi.c:392: warning: 'update_data_by_name' defined but not used certcgi.c:420: warning: 'update_data_by_index' defined but not used certcgi.c:436: warning: 'add_field' defined but not used gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certcgi -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/certcgi.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/certcgi ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certcgi' cd certutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certutil' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certext.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables certext.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables certutil.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/keystuff.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables keystuff.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/certext.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/keystuff.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/certutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certutil' cd checkcert; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/checkcert' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/checkcert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables checkcert.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/checkcert -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/checkcert.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/checkcert ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/checkcert' cd chktest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/chktest' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/chktest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables chktest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/chktest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/chktest.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/chktest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/chktest' cd crlutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crlutil' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crlgen_lex.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables crlgen_lex.c crlgen_lex_orig.l: In function 'yylex': crlgen_lex_orig.l:144: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crlgen.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables crlgen.c crlgen.c: In function 'crlgen_CreateInvalidityDate': crlgen.c:630: warning: 'mark' may be used uninitialized in this function crlgen.c: In function 'crlgen_CreateReasonCode': crlgen.c:580: warning: 'mark' may be used uninitialized in this function gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crlutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables crlutil.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crlutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crlgen.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crlutil.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/crlutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crlutil' cd crmftest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crmftest' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/testcrmf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables testcrmf.c testcrmf.c:973: warning: 'mapWrapKeyType' defined but not used gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmftest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/testcrmf.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcrmf.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/crmftest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crmftest' cd dbtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/dbtest' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dbtest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables dbtest.c ../modutil/error.h:168: warning: 'msgStrings' defined but not used gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dbtest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/dbtest.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/dbtest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/dbtest' cd derdump; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/derdump' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/derdump.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables derdump.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/derdump -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/derdump.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/derdump ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/derdump' cd digest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/digest' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/digest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables digest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/digest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/digest.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/digest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/digest' cd makepqg; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/makepqg' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/makepqg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables makepqg.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/makepqg -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/makepqg.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/makepqg ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/makepqg' cd multinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/multinit' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/multinit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables multinit.c multinit.c:352: warning: 'appendItem' defined but not used gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/multinit -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/multinit.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/multinit ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/multinit' cd ocspclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ocspclnt' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ocspclnt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ocspclnt.c ocspclnt.c: In function 'main': ocspclnt.c:996: warning: 'cert_usage' may be used uninitialized in this function gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ocspclnt -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/ocspclnt.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/ocspclnt ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ocspclnt' cd oidcalc; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/oidcalc' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/oidcalc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables oidcalc.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/oidcalc -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/oidcalc.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/oidcalc ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/oidcalc' cd p7content; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7content' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7content.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables p7content.c p7content.c: In function 'PrintBytes': p7content.c:91: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7content -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/p7content.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/p7content ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7content' cd p7env; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7env' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7env.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables p7env.c p7env.c: In function 'EncryptOut': p7env.c:94: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7env -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/p7env.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/p7env ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7env' cd p7sign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7sign' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7sign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables p7sign.c p7sign.c: In function 'SignOut': p7sign.c:96: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result p7sign.c: In function 'main': p7sign.c:184: warning: 'cert' may be used uninitialized in this function gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7sign -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/p7sign.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/p7sign ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7sign' cd p7verify; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7verify' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7verify.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables p7verify.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7verify -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/p7verify.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/p7verify ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7verify' cd pk12util; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk12util' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk12util.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk12util.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk12util -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/pk12util.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/pk12util ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk12util' cd pk11mode; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk11mode' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11mode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11mode.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11mode -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11mode.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11mode ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk11mode' cd pp; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pp' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pp.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pp -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/pp.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/pp ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pp' cd rsaperf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/rsaperf' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/rsaperf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables rsaperf.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/defkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables defkey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/rsaperf -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/rsaperf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/defkey.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/rsaperf ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/sdrtest' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sdrtest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sdrtest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sdrtest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/sdrtest.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/sdrtest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/sdrtest' cd selfserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/selfserv' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/selfserv.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables selfserv.c selfserv.c: In function 'printSecurityInfo': selfserv.c:407: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result selfserv.c: In function 'logger': selfserv.c:738: warning: pointer targets in passing argument 1 of 'PR_AtomicSet' differ in signedness /usr/include/nspr4/pratom.h:83: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' selfserv.c:739: warning: pointer targets in passing argument 1 of 'PR_AtomicSet' differ in signedness /usr/include/nspr4/pratom.h:83: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' selfserv.c: In function 'handle_connection': selfserv.c:1352: warning: pointer targets in passing argument 1 of 'PR_AtomicAdd' differ in signedness /usr/include/nspr4/pratom.h:95: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' selfserv.c:1353: warning: pointer targets in passing argument 1 of 'PR_AtomicIncrement' differ in signedness /usr/include/nspr4/pratom.h:60: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' selfserv.c:1362: warning: pointer targets in passing argument 1 of 'PR_AtomicDecrement' differ in signedness /usr/include/nspr4/pratom.h:71: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' selfserv.c:1329: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result selfserv.c: In function 'do_accepts': selfserv.c:1447: warning: pointer targets in passing argument 1 of 'PR_AtomicIncrement' differ in signedness /usr/include/nspr4/pratom.h:60: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' selfserv.c: In function 'logWritev': selfserv.c:1565: warning: pointer targets in passing argument 1 of 'PR_AtomicAdd' differ in signedness /usr/include/nspr4/pratom.h:95: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' selfserv.c: In function 'logWrite': selfserv.c:1578: warning: pointer targets in passing argument 1 of 'PR_AtomicAdd' differ in signedness /usr/include/nspr4/pratom.h:95: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' selfserv.c: In function 'logSend': selfserv.c:1595: warning: pointer targets in passing argument 1 of 'PR_AtomicAdd' differ in signedness /usr/include/nspr4/pratom.h:95: note: expected 'PRInt32 *' but argument is of type 'PRUint32 *' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/selfserv -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/selfserv.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/selfserv ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/selfserv' cd signtool; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signtool' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/signtool.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables signtool.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certgen.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables certgen.c certgen.c: In function 'GetSubjectFromUser': certgen.c:157: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result certgen.c:179: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result certgen.c:198: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result certgen.c:216: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result certgen.c:234: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result certgen.c:255: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result certgen.c:273: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result certgen.c: In function 'output_ca_cert': certgen.c:706: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/javascript.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables javascript.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/list.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables list.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables sign.c sign.c: In function 'SignOut': sign.c:866: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/util.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables util.c util.c: In function 'XP_GetString': util.c:53: warning: return discards qualifiers from pointer target type gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/verify.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables verify.c verify.c: In function 'VerifyJar': verify.c:87: warning: assignment discards qualifiers from pointer target type verify.c: In function 'JarWho': verify.c:318: warning: assignment discards qualifiers from pointer target type gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/zip.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables zip.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/signtool -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/signtool.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certgen.o Linux2.6_x86_glibc_PTH_OPT.OBJ/javascript.o Linux2.6_x86_glibc_PTH_OPT.OBJ/list.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sign.o Linux2.6_x86_glibc_PTH_OPT.OBJ/util.o Linux2.6_x86_glibc_PTH_OPT.OBJ/verify.o Linux2.6_x86_glibc_PTH_OPT.OBJ/zip.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/signtool ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signtool' cd signver; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signver' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/signver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables signver.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk7print.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk7print.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/signver -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/signver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk7print.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/signver ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signver' cd shlibsign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables shlibsign.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign.o -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin cd mangle; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/mangle' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/mangle.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables mangle.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/mangle -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/mangle.o -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/mangle ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/mangle' cd Linux2.6_x86_glibc_PTH_OPT.OBJ ; sh "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ" \ "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_glibc_PTH_OPT.OBJ" Linux \ "/usr/lib" "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so" /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so Library File: ../../../security/nss/lib/softoken/Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so 773973 bytes Check File: ../../../security/nss/lib/softoken/Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.chk Link: libsoftokn3.chk hash: 20 bytes 96 d3 d9 25 1a c8 41 17 6f b1 28 5e a6 8a bf 3a 43 06 c3 fa signature: 40 bytes 2e 15 10 19 08 58 05 ca 53 65 ad 2f 33 e5 97 9e b3moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate a DSA key pair ... 97 84 a8 76 1f 5b ce 19 29 00 d3 ce 80 c0 89 15 97 23 e4 3c ab 2a 1b cd Linux2.6_x86_glibc_PTH_OPT.OBJ ; sh "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ" \ "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_glibc_PTH_OPT.OBJ" Linux \ "/usr/lib" "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so" /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so Library File: ../../../security/nss/lib/freebl/Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so 722821 bytes Check File: ../../../security/nss/lib/freebl/Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.chk Link: libfreebl3.chk hash: 20 bytes 64 3e de 7a 1c 0e 21 99 c5 ed 13 d1 e8 f2 9d c1 98 34 e1 83 signature: 40 bytes 47 32 a9 2d 14 52 82 78 02 4f 20 4c 1a 97 ca c4moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate a DSA key pair ... 79 9f aa 8a a9 99 57 f6 7d 7b b7 0e 3b 49 10 9a 9f 05 29 f7 c2 9c 37 0e cd Linux2.6_x86_glibc_PTH_OPT.OBJ ; sh "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ" \ "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_glibc_PTH_OPT.OBJ" Linux \ "/usr/lib" "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so" /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so Library File: ../../../security/nss/lib/softoken/legacydb/Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so 596890 bytes Check File: ../../../security/nss/lib/softoken/legacydb/Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.chk Link: libnssdbm3.chk hash: 20 bytes 86 8a 2e 65 85 a4 59 f1 2f d3 9d 5e 24 05 52 b0 c9 a3 e9 ea signature: 40 bytes 6b e5 78 69 4b aa 5f cb 1d fa a1 2b 4f 0c 3a 29moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate a DSA key pair ... 1e 94 04 9a 7c 2c 11 0e 09 c3 b6 64 53 4a cf e5 35 aa 79 c4 a8 ce 31 65 make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign' cd smimetools; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/smimetools' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables cmsutil.c cmsutil.c: In function 'decode': cmsutil.c:409: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result cmsutil.c: In function 'encrypted_data': cmsutil.c:888: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result cmsutil.c: In function 'main': cmsutil.c:1631: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsutil.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/smimetools' cd ssltap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ssltap' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssltap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ssltap.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssltap -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/ssltap.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/ssltap ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ssltap' cd strsclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/strsclnt' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/strsclnt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables strsclnt.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/strsclnt -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/strsclnt.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/strsclnt ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/symkeyutil' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/symkeyutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables symkeyutil.c symkeyutil.c: In function 'main': symkeyutil.c:1050: warning: unused variable 'rv2' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/symkeyutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/symkeyutil.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/symkeyutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/symkeyutil' cd tests; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tests' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/baddbdir.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables baddbdir.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/baddbdir -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/baddbdir.o \ ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/conflict.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables conflict.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/conflict -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/conflict.o \ ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dertimetest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables dertimetest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dertimetest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/dertimetest.o \ ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/encodeinttest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables encodeinttest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/encodeinttest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/encodeinttest.o \ ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nonspr10.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables nonspr10.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nonspr10 -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/nonspr10.o \ ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/remtest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables remtest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/remtest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/remtest.o \ ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/baddbdir Linux2.6_x86_glibc_PTH_OPT.OBJ/conflict Linux2.6_x86_glibc_PTH_OPT.OBJ/dertimetest Linux2.6_x86_glibc_PTH_OPT.OBJ/encodeinttest Linux2.6_x86_glibc_PTH_OPT.OBJ/nonspr10 Linux2.6_x86_glibc_PTH_OPT.OBJ/remtest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tests' cd tstclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tstclnt' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/tstclnt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables tstclnt.c tstclnt.c: In function 'main': tstclnt.c:846: warning: 'ctmp' may be used uninitialized in this function gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/tstclnt -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/tstclnt.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/tstclnt ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tstclnt' cd vfychain; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfychain' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/vfychain.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables vfychain.c vfychain.c: In function 'configureRevocationParams': vfychain.c:365: warning: 'revFlags' may be used uninitialized in this function gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/vfychain -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/vfychain.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/vfychain ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfychain' cd vfyserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfyserv' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/vfyserv.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables vfyserv.c vfyserv.c: In function 'main': vfyserv.c:546: warning: 'ctmp' may be used uninitialized in this function gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/vfyutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables vfyutil.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/vfyserv -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/vfyserv.o Linux2.6_x86_glibc_PTH_OPT.OBJ/vfyutil.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/vfyserv ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfyserv' cd modutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/modutil' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/modutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables modutil.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables pk11.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/instsec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables instsec.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/install.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables install.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/installparse.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables installparse.c ytab.c: In function 'Pk11Install_yyparse': ytab.c:219: warning: suggest parentheses around assignment used as truth value gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/install-ds.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables install-ds.c install-ds.c: In function 'Pk11Install_File_Generate': install-ds.c:255: warning: comparison with string literal results in unspecified behavior gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables lex.Pk11Install_yy.c lex.Pk11Install_yy.cpp: In function 'Pk11Install_yylex': installparse.l:81: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result installparse.l: At top level: lex.Pk11Install_yy.cpp:1060: warning: 'Pkcs11Install_yyunput' defined but not used lex.Pk11Install_yy.cpp:1106: warning: 'input' defined but not used gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/modutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/modutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11.o Linux2.6_x86_glibc_PTH_OPT.OBJ/instsec.o Linux2.6_x86_glibc_PTH_OPT.OBJ/install.o Linux2.6_x86_glibc_PTH_OPT.OBJ/installparse.o Linux2.6_x86_glibc_PTH_OPT.OBJ/install-ds.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/modutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd' make: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss' + NSS_ENABLE_ECC=1 + export NSS_ENABLE_ECC + NSS_ECC_MORE_THAN_SUITE_B=1 + export NSS_ECC_MORE_THAN_SUITE_B + /usr/bin/make -C ./mozilla/security/coreconf make: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf' cd nsinstall; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf/nsinstall' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf/nsinstall' cd nsinstall; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf/nsinstall' true -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf/nsinstall' make: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/coreconf' + /usr/bin/make -C ./mozilla/security/dbm make: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm' cd include; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/include' ../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ../../../dbm/include/cdefs.h ../../../dbm/include/mcom_db.h ../../../dbm/include/ncompat.h ../../../dbm/include/winfile.h ../../../dist/public/dbm make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/include' cd src; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/src' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/src' cd include; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/include' make[1]: Nothing to be done for `libs'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/include' cd src; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/src' ../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libdbm.a ../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm/src' make: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/dbm' + /usr/bin/make -C ./mozilla/security/nss make: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss' cd lib; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib' cd util; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/util' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 base64.h ciferfam.h nssb64.h nssb64t.h nsslocks.h nssilock.h nssilckt.h nssrwlk.h nssrwlkt.h nssutil.h pkcs11.h pkcs11f.h pkcs11p.h pkcs11t.h pkcs11n.h pkcs11u.h portreg.h secasn1.h secasn1t.h seccomon.h secder.h secdert.h secdig.h secdigt.h secitem.h secoid.h secoidt.h secport.h secerr.h utilrename.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 templates.c ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/util' cd freebl; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 blapit.h shsign.h ecl/ecl-exp.h hasht.h sechash.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 alghmac.h blapi.h secmpi.h secrng.h ec.h ecl/ecl.h ecl/ecl-curve.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' cd softoken; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken' cd legacydb; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodt.h ../../../../dist/public/nss cd legacydb; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 lgglue.h lowkeyi.h lowkeyti.h pk11pars.h pkcs11ni.h softoken.h softoknt.h softkver.h sdb.h sftkdbt.h pk11init.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken' cd base; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/base' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 baset.h base.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/base' cd dev; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/dev' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/dev' cd pki; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pki' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pki' cd libpkix; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix' cd include; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd include; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix' cd certdb; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certdb' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certdb' cd certhigh; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certhigh' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certhigh' cd pk11wrap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pk11wrap' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmod.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/cryptohi' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h ../../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/cryptohi' cd nss; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/nss' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/nss' cd ssl; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ssl' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h ../../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ssl' cd pkcs12; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs12' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs12' cd pkcs7; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs7' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs7' cd smime; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/smime' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/smime' cd crmf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/crmf' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/crmf' cd jar; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/jar' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/jar' cd ckfw; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw' cd builtins; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nsspem.h ../../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h ../../../../dist/public/nss cd builtins; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw' cd sysinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/sysinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib' cd cmd; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd' cd lib; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/lib' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secutil.h pk11table.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/lib' cd addbuiltin; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/addbuiltin' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/addbuiltin' cd atob; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/atob' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/atob' cd bltest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/bltest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/bltest' cd btoa; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/btoa' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/btoa' cd certcgi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certcgi' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certcgi' cd certutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certutil' cd checkcert; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/checkcert' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/checkcert' cd chktest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/chktest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/chktest' cd crlutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crlutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crlutil' cd crmftest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crmftest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crmftest' cd dbtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/dbtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/dbtest' cd derdump; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/derdump' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/derdump' cd digest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/digest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/digest' cd makepqg; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/makepqg' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/makepqg' cd multinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/multinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/multinit' cd ocspclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ocspclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ocspclnt' cd oidcalc; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/oidcalc' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/oidcalc' cd p7content; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7content' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7content' cd p7env; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7env' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7env' cd p7sign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7sign' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7sign' cd p7verify; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7verify' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7verify' cd pk12util; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk12util' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk12util' cd pk11mode; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk11mode' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk11mode' cd pp; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pp' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pp' cd rsaperf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/rsaperf' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/sdrtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/sdrtest' cd selfserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/selfserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/selfserv' cd signtool; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signtool' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signtool' cd signver; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signver' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signver' cd shlibsign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign' cd mangle; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/mangle' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/mangle' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign' cd smimetools; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/smimetools' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/smimetools' cd ssltap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ssltap' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ssltap' cd strsclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/strsclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/symkeyutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/symkeyutil' cd tests; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tests' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tests' cd tstclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tstclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tstclnt' cd vfychain; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfychain' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfychain' cd vfyserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfyserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfyserv' cd modutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/modutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd' cd lib; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib' cd util; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/util' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/util' cd freebl; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libfreebl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib /usr/bin/make FREEBL_CHILD_BUILD=1 \ OBJDIR=Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ecl.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ecl_curve.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ecl_mult.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ecl_gf.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ecp_aff.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ecp_jac.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ecp_mont.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ec_naf.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ecp_jm.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_aff.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ec2_aff.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_mont.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ec2_mont.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_proj.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ec2_proj.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_163.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ec2_163.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_193.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ec2_193.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_233.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ec2_233.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_192.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ecp_192.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_224.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ecp_224.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ecp_256.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_384.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ecp_384.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_521.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i386 -mtune=generic -fasynchronous-unwind-tables ecl/ecp_521.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libfreebl3.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def -Wl,-Bsymbolic -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_aff.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_mont.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_proj.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_163.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_193.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_233.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_192.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_224.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_384.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_521.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_x86.o -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/freebl' cd softoken; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib cd legacydb; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm.a ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken/legacydb' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/softoken' cd base; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/base' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/base' cd dev; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/dev' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdev.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/dev' cd pki; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pki' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pki' cd libpkix; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix' cd include; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' make[3]: Nothing to be done for `libs'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix/util' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix/pkix_pl_nss' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/libpkix' cd certdb; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certdb' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libcertdb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certdb' cd certhigh; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certhigh' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/certhigh' cd pk11wrap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pk11wrap' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/cryptohi' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libcryptohi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/cryptohi' cd nss; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/nss' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/nss' cd ssl; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ssl' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ssl' cd pkcs12; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs12' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs12.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs12' cd pkcs7; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs7' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs7.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/pkcs7' cd smime; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/smime' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/smime' cd crmf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/crmf' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libcrmf.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/crmf' cd jar; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/jar' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libjar.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/jar' cd ckfw; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib cd builtins; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspem.so ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw/pem' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/ckfw' cd sysinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/sysinit' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/lib' cd cmd; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd' cd lib; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/lib' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsectool.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/lib' cd addbuiltin; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/addbuiltin' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/addbuiltin ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/addbuiltin' cd atob; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/atob' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/atob ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/atob' cd bltest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/bltest' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/bltest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/bltest' cd btoa; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/btoa' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/btoa ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/btoa' cd certcgi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certcgi' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/certcgi ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certcgi' cd certutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certutil' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/certutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/certutil' cd checkcert; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/checkcert' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/checkcert ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/checkcert' cd chktest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/chktest' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/chktest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/chktest' cd crlutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crlutil' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/crlutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crlutil' cd crmftest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crmftest' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/crmftest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/crmftest' cd dbtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/dbtest' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/dbtest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/dbtest' cd derdump; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/derdump' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/derdump ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/derdump' cd digest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/digest' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/digest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/digest' cd makepqg; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/makepqg' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/makepqg ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/makepqg' cd multinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/multinit' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/multinit ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/multinit' cd ocspclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ocspclnt' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/ocspclnt ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ocspclnt' cd oidcalc; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/oidcalc' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/oidcalc ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/oidcalc' cd p7content; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7content' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/p7content ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7content' cd p7env; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7env' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/p7env ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7env' cd p7sign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7sign' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/p7sign ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7sign' cd p7verify; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7verify' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/p7verify ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/p7verify' cd pk12util; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk12util' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/pk12util ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk12util' cd pk11mode; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk11mode' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11mode ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pk11mode' cd pp; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pp' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/pp ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/pp' cd rsaperf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/rsaperf' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/rsaperf ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/sdrtest' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/sdrtest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/sdrtest' cd selfserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/selfserv' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/selfserv ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/selfserv' cd signtool; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signtool' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/signtool ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signtool' cd signver; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signver' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/signver ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/signver' cd shlibsign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin cd mangle; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/mangle' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/mangle ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/mangle' cd Linux2.6_x86_glibc_PTH_OPT.OBJ ; sh "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ" \ "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_glibc_PTH_OPT.OBJ" Linux \ "/usr/lib" "/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so" /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so Library File: ../../../security/nss/lib/freebl/Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so 723360 bytes Check File: ../../../security/nss/lib/freebl/Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.chk Link: libfreebl3.chk hash: 20 bytes 9b c3 24 35 d2 45 60 ac 3c 71 c5 02 f6 94 79 2f f2 96 60 9f signature: 40 bytes 79 1e 5a f4 a8 fc 8d ee 03 c7 moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate a DSA key pair ... e4 58 26 05 ba df 3e 2e c9 42 1b 97 39 da 2f e9 93 11 bb a1 e8 26 c4 aa b7 ad 59 12 4f 85 make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/shlibsign' cd smimetools; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/smimetools' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/smimetools' cd ssltap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ssltap' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/ssltap ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/ssltap' cd strsclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/strsclnt' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/strsclnt ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/symkeyutil' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/symkeyutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/symkeyutil' cd tests; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tests' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/baddbdir Linux2.6_x86_glibc_PTH_OPT.OBJ/conflict Linux2.6_x86_glibc_PTH_OPT.OBJ/dertimetest Linux2.6_x86_glibc_PTH_OPT.OBJ/encodeinttest Linux2.6_x86_glibc_PTH_OPT.OBJ/nonspr10 Linux2.6_x86_glibc_PTH_OPT.OBJ/remtest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tests' cd tstclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tstclnt' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/tstclnt ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/tstclnt' cd vfychain; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfychain' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/vfychain ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfychain' cd vfyserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfyserv' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/vfyserv ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/vfyserv' cd modutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/modutil' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/modutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/cmd' make: Leaving directory `/builddir/build/BUILD/nss-3.13.3/mozilla/security/nss' + /bin/mkdir -p ./mozilla/dist/pkgconfig + /bin/cat /builddir/build/SOURCES/nss.pc.in + sed -e s,%libdir%,/usr/lib,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSS_VERSION%,3.13.3,g -e s,%NSPR_VERSION%,4.9,g -e s,%NSSUTIL_VERSION%,3.13.3,g -e s,%SOFTOKEN_VERSION%,3.12.9,g ++ cat mozilla/security/nss/lib/nss/nss.h ++ awk '{print $3}' ++ grep '#define.*NSS_VMAJOR' + NSS_VMAJOR=3 ++ cat mozilla/security/nss/lib/nss/nss.h ++ awk '{print $3}' ++ grep '#define.*NSS_VMINOR' + NSS_VMINOR=13 ++ cat mozilla/security/nss/lib/nss/nss.h ++ awk '{print $3}' ++ grep '#define.*NSS_VPATCH' + NSS_VPATCH=3 + export NSS_VMAJOR + export NSS_VMINOR + export NSS_VPATCH + /bin/cat /builddir/build/SOURCES/nss-config.in + sed -e s,@libdir@,/usr/lib,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,13,g -e s,@MOD_PATCH_VERSION@,3,g + chmod 755 ./mozilla/dist/pkgconfig/nss-config + /bin/cat /builddir/build/SOURCES/setup-nsssysinit.sh + chmod 755 ./mozilla/dist/pkgconfig/setup-nsssysinit.sh Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.2nOHQi + exit 0 + umask 022 + cd /builddir/build/BUILD + '[' /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386 '!=' / ']' + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386 ++ dirname /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386 + mkdir -p /builddir/build/BUILDROOT + mkdir /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386 + cd nss-3.13.3 + LANG=C + export LANG + unset DISPLAY + /bin/rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386 + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/bin + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib/nss/unsupported-tools + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib/pkgconfig + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//etc/pki/nssdb + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert8.db /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//etc/pki/nssdb/cert8.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key3.db /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//etc/pki/nssdb/key3.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-secmod.db /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//etc/pki/nssdb/secmod.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert9.db /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//etc/pki/nssdb/cert9.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key4.db /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//etc/pki/nssdb/key4.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/system-pkcs11.txt /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//etc/pki/nssdb/pkcs11.txt + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/certutil /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/cmsutil /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/crlutil /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/modutil /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/pk12util /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/signtool /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/signver /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/ssltap /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/bin + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/atob /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/btoa /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/derdump /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/ocspclnt /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/pp /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/selfserv /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/strsclnt /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/symkeyutil /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/tstclnt /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/vfyserv /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/vfychain /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib/nss/unsupported-tools + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/base64.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/blapit.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cert.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/certdb.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/certt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/ciferfam.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cmmf.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cmmft.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cms.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cmsreclist.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cmst.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/crmf.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/crmft.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cryptohi.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cryptoht.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/ecl-exp.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/hasht.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/jar-ds.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/jar.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/jarfile.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/key.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/keyhi.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/keyt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/keythi.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nss.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssb64.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssb64t.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssbase.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssbaset.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckbi.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckepv.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckft.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckfw.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckfwc.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckfwt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckg.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckmdt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssilckt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssilock.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nsslocks.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nsspem.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssrwlk.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssrwlkt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssutil.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/ocsp.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/ocspt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/p12.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/p12plcy.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/p12t.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11func.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11pqg.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11priv.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11pub.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11sdr.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11f.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11n.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11p.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11t.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11u.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs12.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs12t.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs7t.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/portreg.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/preenc.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secasn1.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secasn1t.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/seccomon.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secder.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secdert.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secdig.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secdigt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secerr.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/sechash.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secitem.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secmime.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secmod.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secmodt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secoid.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secoidt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secpkcs5.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secpkcs7.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secport.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/shsign.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/smime.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/ssl.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/sslerr.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/sslproto.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/sslt.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/utilrename.h /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3 + /usr/bin/install -p -m 644 ./mozilla/dist/pkgconfig/nss.pc /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/lib/pkgconfig/nss.pc + /usr/bin/install -p -m 755 ./mozilla/dist/pkgconfig/nss-config /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/bin/nss-config + /usr/bin/install -p -m 755 ./mozilla/dist/pkgconfig/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/bin/setup-nsssysinit.sh + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/base64.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/ciferfam.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/nssb64.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/nssb64t.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/nsslocks.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/nssilock.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/nssilckt.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/nssrwlk.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/nssrwlkt.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/nssutil.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/pkcs11.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/pkcs11f.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/pkcs11n.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/pkcs11p.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/pkcs11t.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/pkcs11u.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/portreg.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/secasn1.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/secasn1t.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/seccomon.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/secder.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/secdert.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/secdig.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/secdigt.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/secerr.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/secitem.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/secoid.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/secoidt.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/secport.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/utilrename.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/alghmac.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/blapit.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/ecl-exp.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/hasht.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/sechash.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/secmodt.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/shsign.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386//usr/include/nss3/nsslowhash.h + /usr/lib/rpm/find-debuginfo.sh --strict-build-id /builddir/build/BUILD/nss-3.13.3 extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/lib/libnsssysinit.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/lib/libnssckbi.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/lib/libsmime3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/lib/nss/unsupported-tools/strsclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/lib/nss/unsupported-tools/selfserv extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/lib/nss/unsupported-tools/derdump extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/lib/nss/unsupported-tools/btoa extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/lib/nss/unsupported-tools/tstclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/lib/nss/unsupported-tools/vfyserv extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/lib/nss/unsupported-tools/pp extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/lib/nss/unsupported-tools/symkeyutil extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/lib/nss/unsupported-tools/ocspclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/lib/nss/unsupported-tools/atob extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/lib/nss/unsupported-tools/vfychain extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/lib/libssl3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/lib/libnss3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/lib/libnsspem.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/bin/signver extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/bin/cmsutil extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/bin/signtool extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/bin/pk12util extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/bin/ssltap extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/bin/crlutil extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/bin/modutil extracting debug info from /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386/usr/bin/certutil cpio: nss-3.13.3/mozilla/security/nss/cmd/modutil/lex.Pk11Install_yy.cpp: Cannot stat: No such file or directory cpio: nss-3.13.3/mozilla/security/nss/cmd/modutil/ytab.c: Cannot stat: No such file or directory 23286 blocks + /usr/lib/rpm/check-buildroot + /usr/lib/rpm/redhat/brp-compress + /usr/lib/rpm/redhat/brp-strip-static-archive /usr/bin/strip + /usr/lib/rpm/redhat/brp-strip-comment-note /usr/bin/strip /usr/bin/objdump + /usr/lib/rpm/brp-python-bytecompile + /usr/lib/rpm/redhat/brp-python-hardlink + /usr/lib/rpm/redhat/brp-java-repack-jars Executing(%check): /bin/sh -e /var/tmp/rpm-tmp.YGgRu5 + umask 022 + cd /builddir/build/BUILD + cd nss-3.13.3 + unset DISPLAY + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + BUILD_OPT=1 + export BUILD_OPT ++ find ./mozilla/security/nss/tests ++ grep -c ' ' + SPACEISBAD=0 + : + '[' 0 -ne 0 ']' ++ perl -e 'print 9000 + int rand 1000' 9280 selfserv_9280 + MYRAND=9280 + echo 9280 + RANDSERV=selfserv_9280 + echo selfserv_9280 ++ ls -d ./mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin ./mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin + DISTBINDIR=./mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin + echo ./mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin ++ pwd ~/build/BUILD/nss-3.13.3 ~/build/BUILD/nss-3.13.3 + pushd /builddir/build/BUILD/nss-3.13.3 + cd ./mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin + ln -s selfserv selfserv_9280 ~/build/BUILD/nss-3.13.3 + popd + find ./mozilla/security/nss/tests -type f + xargs -l perl -pi -e 's/\bselfserv\b/selfserv_9280/g' + grep -vw CVS + xargs grep -lw selfserv + grep -v '\.crl$' + grep -v '\.crt$' + grep -v '\.db$' + killall selfserv_9280 selfserv_9280: no process killed + : + rm -rf ./mozilla/tests_results + cd ./mozilla/security/nss/tests/ + HOST=localhost + DOMSUF=localdomain + PORT=9280 + NSS_CYCLES= + NSS_TESTS= + NSS_SSL_TESTS= + NSS_SSL_RUN= + ./all.sh testdir is /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security init.sh init: Creating /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security which: no domainname in (.:/builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/root/bin:/usr/local/sbin:/builddir/bin) ******************************************** Platform: Linux2.6_x86_glibc_PTH_OPT.OBJ Results: localhost.1 ******************************************** init.sh init: Testing PATH .:/builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/root/bin:/usr/local/sbin:/builddir/bin against LIB /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib: Running tests for cipher TIMESTAMP cipher BEGIN: Mon Mar 26 17:34:51 EDT 2012 cipher.sh: Cipher Tests =============================== cipher.sh: DES ECB Encrypt -------------------------------- bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for des_ecb passed. cipher.sh: #1: DES ECB Encrypt - PASSED cipher.sh: DES ECB Decrypt -------------------------------- bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for des_ecb passed. cipher.sh: #2: DES ECB Decrypt - PASSED cipher.sh: DES CBC Encrypt -------------------------------- bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for des_cbc passed. cipher.sh: #3: DES CBC Encrypt - PASSED cipher.sh: DES CBC Decrypt -------------------------------- bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for des_cbc passed. cipher.sh: #4: DES CBC Decrypt - PASSED cipher.sh: DES3 ECB Encrypt -------------------------------- bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for des3_ecb passed. cipher.sh: #5: DES3 ECB Encrypt - PASSED cipher.sh: DES3 ECB Decrypt -------------------------------- bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for des3_ecb passed. cipher.sh: #6: DES3 ECB Decrypt - PASSED cipher.sh: DES3 CBC Encrypt -------------------------------- bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for des3_cbc passed. cipher.sh: #7: DES3 CBC Encrypt - PASSED cipher.sh: DES3 CBC Decrypt -------------------------------- bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for des3_cbc passed. cipher.sh: #8: DES3 CBC Decrypt - PASSED cipher.sh: AES ECB Encrypt -------------------------------- bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for aes_ecb passed. cipher.sh: #9: AES ECB Encrypt - PASSED cipher.sh: AES ECB Decrypt -------------------------------- bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for aes_ecb passed. cipher.sh: #10: AES ECB Decrypt - PASSED cipher.sh: AES CBC Encrypt -------------------------------- bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for aes_cbc passed. cipher.sh: #11: AES CBC Encrypt - PASSED cipher.sh: AES CBC Decrypt -------------------------------- bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for aes_cbc passed. cipher.sh: #12: AES CBC Decrypt - PASSED cipher.sh: Camellia ECB Encrypt -------------------------------- bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. cipher.sh: #13: Camellia ECB Encrypt - PASSED cipher.sh: Camellia ECB Decrypt -------------------------------- bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. cipher.sh: #14: Camellia ECB Decrypt - PASSED cipher.sh: Camellia CBC Encrypt -------------------------------- bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. cipher.sh: #15: Camellia CBC Encrypt - PASSED cipher.sh: Camellia CBC Decrypt -------------------------------- bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. cipher.sh: #16: Camellia CBC Decrypt - PASSED cipher.sh: SEED ECB Encrypt -------------------------------- bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for seed_ecb passed. cipher.sh: #17: SEED ECB Encrypt - PASSED cipher.sh: SEED ECB Decrypt -------------------------------- bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for seed_ecb passed. cipher.sh: #18: SEED ECB Decrypt - PASSED cipher.sh: SEED CBC Encrypt -------------------------------- bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for seed_cbc passed. cipher.sh: #19: SEED CBC Encrypt - PASSED cipher.sh: SEED CBC Decrypt -------------------------------- bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for seed_cbc passed. cipher.sh: #20: SEED CBC Decrypt - PASSED cipher.sh: RC2 ECB Encrypt -------------------------------- bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for rc2_ecb passed. cipher.sh: #21: RC2 ECB Encrypt - PASSED cipher.sh: RC2 ECB Decrypt -------------------------------- bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for rc2_ecb passed. cipher.sh: #22: RC2 ECB Decrypt - PASSED cipher.sh: RC2 CBC Encrypt -------------------------------- bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for rc2_cbc passed. cipher.sh: #23: RC2 CBC Encrypt - PASSED cipher.sh: RC2 CBC Decrypt -------------------------------- bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for rc2_cbc passed. cipher.sh: #24: RC2 CBC Decrypt - PASSED cipher.sh: RC4 Encrypt -------------------------------- bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. cipher.sh: #25: RC4 Encrypt - PASSED cipher.sh: RC4 Decrypt -------------------------------- bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. cipher.sh: #26: RC4 Decrypt - PASSED cipher.sh: RSA Encrypt -------------------------------- bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for rsa passed. cipher.sh: #27: RSA Encrypt - PASSED cipher.sh: RSA Decrypt -------------------------------- bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for rsa passed. cipher.sh: #28: RSA Decrypt - PASSED cipher.sh: DSA Sign -------------------------------- bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Signature self-test for dsa passed. cipher.sh: #29: DSA Sign - PASSED cipher.sh: DSA Verify -------------------------------- bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Verification self-test for dsa passed. cipher.sh: #30: DSA Verify - PASSED cipher.sh: MD2 Hash -------------------------------- bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for md2 passed. cipher.sh: #31: MD2 Hash - PASSED cipher.sh: MD5 Hash -------------------------------- bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for md5 passed. cipher.sh: #32: MD5 Hash - PASSED cipher.sh: SHA1 Hash -------------------------------- bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha1 passed. cipher.sh: #33: SHA1 Hash - PASSED cipher.sh: SHA224 Hash -------------------------------- bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. cipher.sh: #34: SHA224 Hash - PASSED cipher.sh: SHA256 Hash -------------------------------- bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. cipher.sh: #35: SHA256 Hash - PASSED cipher.sh: SHA384 Hash -------------------------------- bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. cipher.sh: #36: SHA384 Hash - PASSED cipher.sh: SHA512 Hash -------------------------------- bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. cipher.sh: #37: SHA512 Hash - PASSED TIMESTAMP cipher END: Mon Mar 26 17:35:15 EDT 2012 Running tests for libpkix TIMESTAMP libpkix BEGIN: Mon Mar 26 17:35:15 EDT 2012 TIMESTAMP libpkix END: Mon Mar 26 17:35:15 EDT 2012 Running tests for cert TIMESTAMP cert BEGIN: Mon Mar 26 17:35:15 EDT 2012 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #38: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -f ../tests.pw cert.sh: #39: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #40: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #41: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -o root.cert cert.sh: #42: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA -f ../tests.pw cert.sh: #43: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #44: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #45: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #46: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #47: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #48: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #49: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #50: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA -f ../tests.pw cert.sh: #51: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #52: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #53: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #54: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #55: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #56: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #57: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #58: Exporting Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -f ../tests.pw cert.sh: #59: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #60: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #63: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #64: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #65: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA/chain-2-serverCA.ca.cert cert.sh: #66: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA/chain-1-serverCA.ca.cert cert.sh: #67: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -f ../tests.pw cert.sh: #68: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #69: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #70: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #71: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert cert.sh: #72: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #73: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #74: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA/chain-1-clientCA.ca.cert cert.sh: #75: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/clientCA/chain-2-clientCA.ca.cert cert.sh: #76: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw cert.sh: #77: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #78: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -i ../CA/TestCA.ca.cert cert.sh: #79: Import Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #80: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #81: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser.cert cert.sh: #82: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #83: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #84: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -i ../CA/TestCA.ca.cert cert.sh: #85: Import Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #86: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #87: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #88: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #89: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #90: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain.cert cert.sh: #91: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #92: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/alicedir -f ../tests.pw cert.sh: #93: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #94: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/alicedir -i ../CA/TestCA.ca.cert cert.sh: #95: Import Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #96: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #97: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice.cert cert.sh: #98: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/bobdir -f ../tests.pw cert.sh: #99: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #100: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/bobdir -i ../CA/TestCA.ca.cert cert.sh: #101: Import Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #102: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #103: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob.cert cert.sh: #104: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dave -f ../tests.pw cert.sh: #105: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #106: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dave -i ../CA/TestCA.ca.cert cert.sh: #107: Import Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #108: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #109: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave.cert cert.sh: #110: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/eve -f ../tests.pw cert.sh: #111: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #112: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/eve -i ../CA/TestCA.ca.cert cert.sh: #113: Import Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #114: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #115: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve.cert cert.sh: #116: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #117: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #118: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #119: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #120: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #121: Import Eve's cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips -f ../tests.fipspw cert.sh: #122: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #123: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #124: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... cert.sh: #125: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -f ../tests.pw cert.sh: #126: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #127: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #128: Import Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #129: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #130: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt.cert cert.sh: #131: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:84:d9 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:35:22 2012 Not After : Tue Jun 26 21:35:22 2012 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:3f:e3:bc:14:2d:18:03:b7:cd:2e:d8:9c:b1:b4:c6: c4:44:5f:4d:48:e6:08:fd:ee:5e:89:71:e3:c6:10:5c: 96:bb:cd:ef:5c:53:13:41:2e:60:2a:c4:63:c8:02:f4: d7:f7:3d:fe:11:34:11:76:28:7d:68:04:34:05:0d:61: 52:27:c1:3f:7b:23:23:f3:97:fd:d5:34:d0:2e:40:45: 7b:e1:58:07:89:0f:d4:06:4d:05:03:ed:ec:74:2f:72: df:f2:2a:a2:9f:72:71:5b:3a:3a:e9:8c:a0:ff:a2:96: 5a:fd:5b:3d:a9:55:70:58:88:a5:a0:11:76:79:34:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: be:50:71:9b:6e:66:c7:cb:78:65:b4:76:8a:97:d8:e9: e0:38:c0:ab:be:12:95:20:5d:1c:8e:7c:8c:2b:9f:e1: ec:19:bb:10:7f:60:0f:3c:b3:7d:a2:45:b6:77:3c:0a: ab:81:e9:21:26:05:f7:e3:e7:72:17:27:13:91:74:65: 16:da:c3:9f:1a:10:b3:be:35:bc:2e:f9:df:e4:3e:28: 9d:5f:c8:40:eb:ec:cb:03:f8:e4:4f:cf:40:af:32:cd: 94:01:97:60:db:e4:e3:15:33:9c:c3:5e:66:29:23:8f: 83:cb:8c:54:19:80:67:7a:23:47:7c:e4:de:a6:a4:b9 Fingerprint (MD5): AF:A7:EF:D5:EE:DA:12:0D:F2:4C:01:50:8F:B6:C0:9F Fingerprint (SHA1): E5:46:9D:23:DF:87:0A:A3:F3:F0:FE:56:BC:3A:A4:0C:8B:81:25:30 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #132: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:84:da Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:35:22 2012 Not After : Tue Jun 26 21:35:22 2012 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:b6:b6:37:1f:bd:23:ef:3e:71:75:fe:18:a8:64:01: cc:5a:85:ae:a9:56:9f:b7:15:d6:9f:23:f4:81:82:f2: 3c:93:df:ac:27:0c:87:bc:ee:b2:68:d0:7a:11:39:fd: bc:80:1a:66:df:e8:c3:ae:28:b2:f5:bf:a6:47:61:6d: 6f:70:74:4f:3d:36:6d:da:73:11:b8:99:28:87:c3:d1: de:26:3c:60:f3:67:0d:41:68:f9:ee:75:2c:78:f2:fd: 98:b8:49:ee:a2:7a:97:78:95:dc:4b:98:e6:89:eb:c9: 2a:6a:3d:80:d7:5e:75:3e:f0:1e:d7:95:f2:02:19:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 69:07:78:b0:7f:7b:45:2c:c5:33:8c:74:e0:5e:44:f2: 19:ab:00:2d:ad:9f:3d:b9:26:08:3f:2a:85:5e:5e:5a: da:84:3b:6b:5f:b7:ab:3a:d8:14:fe:1a:22:8f:c3:62: 9f:9a:32:1c:b6:76:20:eb:d0:14:95:2d:2c:bc:04:42: 56:9d:b6:da:75:b8:6a:cb:07:44:bf:73:60:0a:b7:2c: 1c:38:ed:f2:70:aa:f5:bb:c1:2b:b5:93:cb:31:5b:86: 69:13:59:2b:d6:b5:bf:87:d4:1e:77:d1:b7:2d:0a:72: ae:59:be:85:34:2c:e1:5d:91:d3:72:76:7f:93:26:fe Fingerprint (MD5): 55:0E:69:92:5B:DB:5F:C6:12:BE:81:72:DA:FB:F2:DB Fingerprint (SHA1): 7D:71:A7:B8:E5:BE:A4:17:4F:E7:5B:0F:51:13:0D:67:F7:8D:E1:31 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #133: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:84:da Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:35:23 2012 Not After : Tue Jun 26 21:35:23 2012 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:a7:4d:ae:0f:d3:06:ee:d2:5c:6f:01:d3:1f:ec:4e: 0f:a9:60:5f:3a:b8:48:03:96:c7:ce:04:82:fd:66:71: 43:da:55:42:03:d3:07:45:ed:b6:7a:b1:6b:9e:e9:73: 2e:b2:63:59:e8:56:ce:57:5d:d1:cd:e5:a3:bb:37:b4: c6:e9:b0:f1:98:b8:61:7b:ab:28:cb:cb:ae:88:f7:b9: 3d:2b:69:ab:88:a2:7b:9f:fa:4d:6b:9b:6c:d9:e7:a0: dc:96:df:bf:2d:99:7c:b6:65:d9:00:3d:5b:f9:d9:20: 17:bb:d6:88:ec:fa:3b:41:15:fe:24:3d:84:71:71:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7c:4f:a3:0e:32:06:80:82:76:67:22:6e:92:11:9d:7c: c0:7f:dc:b4:a7:0a:34:09:63:88:7f:9b:d4:21:78:46: 21:a9:ef:0a:79:f3:2f:f2:ed:c0:7e:4d:ba:d5:a1:26: 0b:0f:1c:6c:5a:43:0e:99:bd:bf:ae:e9:e5:af:42:18: 63:a9:32:d0:fd:22:3a:01:a0:d4:3b:92:4d:eb:94:db: b1:51:db:81:a3:2a:9a:dc:b1:0d:a3:cc:6a:0b:dc:23: 01:79:c0:37:f4:8a:85:ed:10:57:3c:c4:e8:1e:82:8f: fb:54:ab:b2:6c:52:66:9b:b0:32:07:ee:08:5c:f4:25 Fingerprint (MD5): 48:ED:EA:E1:C3:A2:12:E2:D2:97:74:9D:07:10:2D:40 Fingerprint (SHA1): DF:6A:73:DC:50:8C:E3:F1:FF:22:F1:FE:7B:F1:D9:E7:F1:CC:69:3E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #134: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:84:db Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:35:23 2012 Not After : Tue Jun 26 21:35:23 2012 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:2b:1b:3d:f8:70:21:f6:12:ff:bc:45:3e:f2:d3:ea: 87:7f:4b:4a:01:08:7d:0a:e4:fc:b0:9a:1d:1c:64:5b: 86:dc:27:ff:be:33:be:d6:5a:fa:1d:4c:43:5c:3c:b3: b2:fc:b9:aa:f7:da:b6:9c:81:d7:5a:b7:6e:1f:ce:36: 7d:41:d4:4a:a7:91:cb:2f:65:23:8e:ae:aa:23:b3:5c: 81:17:a9:bb:ec:16:19:99:e9:0c:30:de:05:cb:fa:51: 03:6b:6d:1a:90:7b:5d:03:dd:25:9a:75:fe:0e:03:d5: 8a:34:06:30:16:9e:fe:75:7c:4c:7b:dc:60:0b:1f:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c5:0b:03:eb:af:8d:0c:09:90:eb:56:d7:d9:99:d1:ce: 52:af:47:0b:db:1d:cc:d6:fb:f9:c3:ac:dc:df:7c:e4: 51:1c:db:b8:86:56:17:2c:85:c9:c5:c6:76:a5:36:8c: 66:23:8f:50:b1:6c:74:53:96:46:a9:65:b2:d6:5c:8d: 8d:54:52:20:59:17:bd:55:ff:c4:eb:f3:59:1f:e4:ab: 25:d4:fc:c4:3c:17:eb:e5:fa:b2:38:d0:40:df:e5:00: 5a:de:5d:66:07:20:c4:c8:c5:1e:69:43:8f:a1:de:80: f1:53:b3:df:48:f8:62:47:97:c9:d2:62:00:ed:bc:f4 Fingerprint (MD5): 46:36:6E:62:4B:F6:6A:BC:C0:14:AF:49:B3:81:E6:32 Fingerprint (SHA1): 90:37:7F:64:44:8F:E8:DD:FF:31:28:FB:5B:4C:83:8C:A5:F0:56:5E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #135: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:84:dc Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:35:24 2012 Not After : Tue Jun 26 21:35:24 2012 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:77:dc:c6:25:90:87:b5:80:0f:89:9a:6f:70:68:6c: 76:93:15:3b:2b:ef:43:10:a6:23:c0:5e:b7:cf:b4:14: 5f:11:e3:35:d1:13:f1:dd:e0:f4:c5:21:a0:fa:f5:c8: 52:75:52:cd:84:3d:53:96:05:d2:93:88:32:85:ae:2c: 50:bf:a8:db:cf:72:63:be:62:02:f1:8a:17:65:f1:f9: c6:0a:35:fd:58:16:01:2e:bf:b8:71:a5:2c:02:bf:71: a7:5b:89:53:26:9d:c7:8c:f7:97:b9:e0:ed:1a:51:ff: af:be:b0:60:2c:95:75:ae:63:c0:01:c8:ca:6e:ff:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2a:5f:5a:16:1a:25:6a:e0:0a:6c:22:3c:a3:9c:5f:d2: 00:3a:d1:58:11:98:b3:2c:ed:5a:5f:d8:50:74:9e:39: a6:37:78:f5:e3:ed:62:5a:b0:4c:09:61:33:4d:4e:82: cf:32:cf:56:d5:9d:b3:59:90:ea:b9:92:16:ab:25:d5: cf:2e:c0:2a:55:fa:8a:3e:c9:63:ae:2e:a5:66:7f:d3: 87:17:7c:10:5e:2f:ce:f6:88:ac:ce:0a:5d:77:e7:8f: aa:cb:36:63:60:d5:6e:42:fb:1a:d1:43:c4:0c:12:24: af:b2:78:a7:18:bb:76:44:b5:bf:f0:cb:51:b1:1c:3d Fingerprint (MD5): 5B:D0:11:5B:6F:6E:45:7E:1D:14:6E:F2:34:F3:41:96 Fingerprint (SHA1): 26:48:45:ED:B1:E6:71:F4:14:12:4E:74:6D:38:CD:DE:36:C1:42:7A Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #136: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:84:dd Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:35:24 2012 Not After : Tue Jun 26 21:35:24 2012 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:43:82:cd:bd:3d:b8:2c:b4:97:f5:b9:1d:07:77:6b: 18:c8:d8:17:3c:7c:2e:2d:f1:dc:29:6e:9f:60:93:8b: 9f:d1:15:b8:0b:d1:ed:5f:a2:d0:7e:0b:4a:c1:fd:e9: 43:c6:47:0f:25:e1:5e:bd:27:f0:f4:4e:3b:c1:5a:93: 25:be:44:c9:d5:21:b9:b8:76:a2:75:c7:e2:6b:68:18: 65:05:87:9b:fd:f5:96:9a:d2:7a:c1:44:cd:14:e9:0c: 9d:3e:29:90:a1:02:85:89:a7:06:96:00:9a:d3:58:af: ce:3b:05:4e:70:60:cd:60:c0:9d:a5:8f:fe:a8:01:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 19:01:5d:f4:80:3b:f8:2e:e9:36:1c:c0:6d:c3:46:88: 74:da:dd:d9:41:c4:97:0b:39:b3:be:6f:c3:c1:62:ba: 74:7f:23:f0:55:c0:97:18:95:d4:1e:e2:ad:48:46:51: 4b:0d:5c:05:d1:e8:8e:bd:57:f4:66:2a:c7:06:73:93: 72:d4:23:6d:21:73:3e:fd:25:37:73:71:b7:2a:f3:8f: ab:e4:79:62:3d:77:30:45:97:8c:01:f0:a4:ed:13:b0: bf:e5:f1:bd:b3:b8:94:e3:b6:7e:84:03:d3:9b:13:fa: 36:98:ec:44:c2:13:68:68:b1:e6:7d:16:e9:e7:26:a7 Fingerprint (MD5): 6E:99:60:F0:41:49:8C:D2:72:E9:05:7F:A4:E2:92:B4 Fingerprint (SHA1): 1D:9A:C4:5F:A3:23:B2:DA:18:3C:75:7A:4D:04:19:81:02:AD:16:16 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #137: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:84:de Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:35:24 2012 Not After : Tue Jun 26 21:35:24 2012 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:e2:1a:02:fa:e5:af:5e:76:7e:d4:99:c4:78:a5:89: 58:62:f6:76:e5:ae:85:6c:2c:67:5d:ab:19:aa:5e:5a: 38:8b:6d:b3:3b:25:9b:ec:6b:02:32:48:68:57:3d:f3: 19:d8:f5:fa:a2:f4:3f:7c:0a:6d:cd:1d:5e:4a:29:98: 43:e5:75:b3:05:97:d6:c0:9f:6b:3a:61:a9:d8:f3:b4: 00:ec:df:51:85:ca:99:1d:ec:30:8c:1e:8e:77:b2:95: f2:a3:af:a7:00:e3:a7:d4:3a:e6:30:9c:46:99:bf:92: 8f:79:b9:61:c3:2a:a3:51:f0:45:f6:5c:48:75:da:53 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 64:38:0a:35:bc:37:9d:7f:e0:46:0c:b4:34:a7:e1:61: 7e:3f:35:19:b3:6b:b9:46:e9:26:b0:bb:53:ab:3a:b1: a3:7c:a9:51:e7:46:21:f9:17:30:30:e2:76:95:24:4c: c7:a5:39:8f:7b:bf:ce:e9:66:73:4c:55:d4:ca:6e:ad: 3b:16:ea:e6:d7:da:f7:0b:4c:44:60:c7:29:25:16:9d: 2c:a6:1b:34:fc:b5:0f:cb:ec:bf:fc:f0:39:7c:3a:c4: 6d:b8:57:c2:6b:6b:d2:fc:35:f5:f0:e3:66:9e:04:ef: 23:2e:88:72:b0:ab:6c:4e:de:43:55:b3:16:14:20:d7 Fingerprint (MD5): 0E:04:1F:82:FA:4B:5A:6B:48:1A:0F:DC:65:A0:F4:6C Fingerprint (SHA1): 3B:2E:7B:B1:9A:57:B4:E2:62:56:81:EF:3F:AE:62:A0:B2:F7:0C:0F Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #138: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:84:de Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:35:25 2012 Not After : Tue Jun 26 21:35:25 2012 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f2:21:db:8b:9e:af:97:03:10:a2:4a:09:f2:98:8b:53: 25:44:42:19:e7:b0:38:89:29:11:f8:26:c6:f1:9e:e4: 13:62:76:9e:30:27:97:17:72:fb:b1:95:c7:c1:d3:20: 98:1f:c6:d4:1c:b7:a1:87:a6:09:06:e9:c5:23:f7:cb: 01:06:52:74:9c:46:92:f4:df:eb:4a:e4:ec:d9:d7:cb: 58:5f:f4:af:e3:b7:34:ba:a5:d6:0c:fc:39:ac:bd:e5: 01:f0:6d:06:6c:ad:76:4e:b4:d4:72:e0:91:43:2a:a7: 11:6d:5a:10:70:28:5c:d5:d3:2b:d1:dd:3e:12:68:0d Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 00:07:45:d1:64:95:80:c6:18:23:d5:8f:9b:b1:a3:cf: 67:63:6e:2b:14:c6:b2:5b:fa:db:cf:fe:bd:d1:2b:86: ac:ba:79:7d:32:e6:ac:e2:08:dc:ea:01:92:f5:e4:41: 92:82:5d:23:6a:2a:59:76:d8:d9:a9:b6:9a:30:e5:b8: 6a:a1:f3:67:ee:c0:c3:60:14:cd:f2:25:de:15:c8:a2: 63:5b:f0:46:4c:f2:2b:85:ec:3d:dd:97:17:4b:a1:d3: d5:79:df:e1:56:14:81:29:aa:f4:cc:58:ca:20:a1:e7: 5b:de:06:6a:ca:f7:4e:1b:ef:08:ba:23:34:23:0a:f4 Fingerprint (MD5): C4:AB:3D:D3:59:11:29:15:DC:CA:D3:0E:4B:B5:C5:86 Fingerprint (SHA1): 2B:FB:89:6D:E1:40:DB:AB:D7:D4:33:E0:7C:01:6E:41:AB:81:FA:E8 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #139: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:84:df Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:35:25 2012 Not After : Tue Jun 26 21:35:25 2012 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:d3:86:51:ef:8b:5d:af:8a:6f:01:b5:83:87:bc:7a: a8:a4:4f:6e:12:b4:35:fa:bd:a9:14:c1:83:c0:cf:7f: 05:ef:c2:14:80:2b:90:e5:69:85:8b:8e:aa:7b:01:c8: 19:9b:5e:ae:89:60:dd:14:38:8b:91:3e:2b:8e:89:ad: 53:6b:c1:c3:d8:e7:fb:6c:78:8f:cd:e5:7e:da:6d:33: 5f:3c:48:9b:0a:80:f3:61:6e:fb:9c:60:23:9f:27:33: b4:e2:fa:aa:97:82:83:40:69:a3:a7:de:64:59:76:ce: 1f:fc:1c:02:8a:ec:9a:81:65:ac:84:69:af:ee:1c:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 46:be:28:b8:41:04:53:33:ca:e8:0f:60:f2:27:70:03: 37:b4:4c:c2:d2:0b:c3:99:7b:5c:1f:72:2b:8e:71:9e: 99:9f:19:05:f1:09:63:f1:b8:e4:92:c7:e4:9d:53:0a: 6e:1a:71:7d:f1:47:fe:06:3d:d6:50:eb:f8:41:a1:cb: a5:84:8e:8f:c8:9f:5d:ca:eb:aa:a9:80:b6:a4:45:a5: ac:36:51:f8:50:ba:9e:3e:f2:9b:f8:1e:e7:a9:01:d1: 7c:ae:ba:0c:4b:f8:23:78:c0:36:ff:c9:91:3c:b1:f5: ef:d6:71:ad:2d:b7:88:2e:78:58:74:1a:11:f1:9f:b2 Fingerprint (MD5): 85:3B:EB:1D:99:E6:EB:51:0F:78:34:58:F5:00:D8:A2 Fingerprint (SHA1): 74:F4:31:18:B3:54:2A:C1:C1:4F:D8:E9:01:F1:7A:C1:4A:10:23:BA Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #140: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:84:e0 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:35:26 2012 Not After : Tue Jun 26 21:35:26 2012 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:40:8b:59:3b:fe:2d:00:7b:57:1b:9f:29:40:b1:ec: c1:ec:23:ce:36:f4:c3:3c:81:0a:20:01:d1:26:32:f9: 20:52:21:92:67:f3:17:74:17:b4:cd:7c:72:d9:09:37: f9:11:d4:3e:c6:e9:f3:69:ae:c7:21:f9:aa:1e:03:1f: 20:ca:c5:f9:90:b8:bc:23:ed:80:10:5e:4f:35:45:1c: 86:0d:cc:90:57:0d:b9:ea:c7:1b:88:3d:d2:d9:16:0a: 24:b8:f8:6a:7d:97:30:54:ea:b0:da:e3:13:82:71:be: 4c:eb:68:86:d0:5f:ab:5f:72:07:55:9e:33:47:f4:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3c:39:6d:5f:1a:d8:22:c5:9d:92:16:1b:e5:2c:51:ec: 48:76:d6:42:39:1a:af:8b:f5:92:a7:19:91:54:7f:79: 2f:20:20:ec:cf:3b:75:f2:68:68:51:2c:8c:fc:29:b7: e3:71:1e:8e:fc:e7:47:87:9a:ad:d7:17:fa:e4:65:35: fd:e4:4c:99:c3:46:3b:bb:c4:49:97:ba:fd:74:69:05: 24:22:0a:f8:01:2e:bc:0f:9e:95:f7:71:04:a9:75:55: 57:94:8c:f9:9b:57:05:6f:d0:06:99:60:26:b3:4d:43: 06:85:5c:c2:39:2b:51:4f:20:6b:9f:ae:20:0c:2a:d2 Fingerprint (MD5): 38:9D:1F:3D:95:EB:1B:DD:3C:AC:CC:87:69:C0:40:3A Fingerprint (SHA1): 76:32:CC:DF:BF:E7:89:78:D7:06:AB:66:F4:CD:17:76:D8:02:DB:23 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #141: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:84:e0 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:35:26 2012 Not After : Tue Jun 26 21:35:26 2012 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:4b:a8:e6:82:0b:c6:61:cf:ec:b4:7c:3f:7f:45:da: 14:5f:94:62:6d:b5:9f:02:d2:ed:d7:6b:95:98:ec:44: b8:cc:c4:40:40:e5:c9:bd:d1:b3:c8:f4:4b:35:d4:ac: 69:0f:bd:7a:17:b2:2a:96:c0:d9:70:6f:e4:c6:d0:eb: 70:6c:25:9a:9e:f7:ae:d8:6c:c1:03:d2:c4:bb:d5:e3: d7:89:f1:b5:58:98:2c:28:9b:ae:e6:27:ab:56:69:88: 38:34:cc:dd:3f:03:55:c0:88:68:ae:29:f5:2a:72:b3: cc:88:63:70:35:65:9e:7c:ef:78:0f:5e:b2:e8:57:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c0:6d:ad:68:32:87:ea:1e:bb:79:4c:a5:b9:f4:3d:4c: f4:0c:e8:cc:5f:8d:85:6f:19:68:a0:cb:03:30:c5:d3: 45:01:14:74:fb:fc:42:2c:0f:fe:41:2e:34:14:55:c6: 9f:2c:d2:ac:f0:25:19:16:58:d5:63:89:3c:9c:9b:4d: 25:b7:af:f9:d9:6a:5c:bd:78:87:c4:bc:4d:2e:72:0f: c9:e0:2d:08:f5:4d:5e:76:d6:3a:d4:c4:02:4d:a6:48: 23:d1:b8:d6:04:f7:ad:ab:d7:b7:8d:d8:55:06:da:cc: aa:dc:b5:2e:a0:f8:67:1c:65:88:79:94:e0:14:2b:d8 Fingerprint (MD5): 3F:02:14:9C:F6:33:F0:98:21:C7:0C:4A:D6:3D:05:DE Fingerprint (SHA1): C4:97:66:50:FD:1D:A9:07:86:4B:D2:8C:E3:3F:EA:94:B3:AD:48:AC Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #142: Certificate Key Usage Extension (11) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dbpass -f ../tests.pw cert.sh: #143: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #144: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #145: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dbpass -o root.cert cert.sh: #146: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #147: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... cert.sh: #148: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #149: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #150: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #151: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -i ../CA/TestCA.ca.cert cert.sh: #152: Import Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #153: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #154: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted.cert cert.sh: #155: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #156: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #157: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -o root.cert cert.sh: #158: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #159: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #160: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: `./req' and `/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #161: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert cert.sh: #162: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #163: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #164: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #165: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #166: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #167: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #168: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #169: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #170: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #171: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #172: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #173: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #174: Verify Distrusted Cert for Object Signer - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #176: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40.cert cert.sh: #177: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #178: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #179: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41.cert cert.sh: #180: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #181: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #182: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42.cert cert.sh: #183: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #184: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #185: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43.cert cert.sh: #186: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #187: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #188: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44.cert cert.sh: #189: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #190: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #191: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45.cert cert.sh: #192: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #193: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #194: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46.cert cert.sh: #195: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #196: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #197: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47.cert cert.sh: #198: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #199: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #200: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48.cert cert.sh: #201: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #202: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #203: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49.cert cert.sh: #204: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #205: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #206: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50.cert cert.sh: #207: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #208: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #209: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51.cert cert.sh: #210: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #211: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #212: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52.cert cert.sh: #213: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #214: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #215: Modify CRL by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #216: Modify CRL by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #217: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #218: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: No matching CRL was found. cert.sh: #219: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #220: Importing CRL for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Mon Mar 26 17:35:42 EDT 2012 Running tests for dbtests TIMESTAMP dbtests BEGIN: Mon Mar 26 17:35:42 EDT 2012 ./dbtests.sh: line 206: syntax error near unexpected token `then' ./dbtests.sh: line 206: ` if [[ $EUID -ne 0 ]] then' TIMESTAMP dbtests END: Mon Mar 26 17:35:42 EDT 2012 Running tests for tools TIMESTAMP tools BEGIN: Mon Mar 26 17:35:42 EDT 2012 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 41:2d:a4:23:2d:6f:61:c2:08:44:c1:d9:4e:9a:21:8c Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #222: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #223: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #224: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 40:1e:37:ab:aa:b3:27:8c:73:97:00:bd:f1:f2:ec:0b Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #225: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #226: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #227: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 73:76:48:e4:ad:5b:81:fa:bb:7b:2d:f2:fc:fa:75:4f Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #228: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #229: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #230: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: e8:c1:6f:2f:c5:b6:18:2c:35:c2:e5:74:23:e1:ca:d3 Iteration Count: 1 (0x1) tools.sh: #231: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 12:5d:25:1d:03:7c:01:9c:4a:5d:fe:ad:9e:82:87:12 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #234: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #235: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #236: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ba:1b:c7:33:f7:c6:17:05:43:b5:c0:a6:51:07:89:82 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #237: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #238: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #239: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3d:82:59:53:f6:09:61:f7:ba:22:43:c1:c0:2e:ca:56 Iteration Count: 1 (0x1) tools.sh: #240: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #241: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #242: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 83:54:2c:e8:bb:0d:c3:27:f7:dd:ff:21:b1:77:69:26 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:34:bd:76:ca:de:28:db:e0:c3:91:01:b0:e3:83: 0c:ae Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 02:c4:79:72:e2:45:12:ba:af:4f:68:e0:6e:e2:1d:bd Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:a9:69:2b:ab:95:22:fc:74:11:52:72:7d:b1:40: e8:be Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #246: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #247: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #248: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8a:10:04:3d:28:aa:31:93:8a:8d:f4:9d:0b:a5:2a:64 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:eb:48:ba:c6:c1:5a:18:ae:d4:ba:cf:99:ad:e1: 59:40 tools.sh: #249: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #250: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #251: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 74:cf:b8:85:5c:54:b2:b0:dc:a3:31:70:b0:75:70:bb Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:ae:49:a6:6c:10:88:0d:a0:7b:12:df:1c:6e:e8: 21:1f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #252: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #253: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #254: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9a:63:7c:c0:1e:ec:3e:0f:49:59:6d:59:87:ee:3c:10 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:d3:1c:dd:49:18:ab:6d:dd:75:d1:a5:71:c9:c1: 77:6a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2e:28:db:64:30:72:ac:b8:c0:d8:9f:73:64:e2:96:b5 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:22:c8:30:59:ff:09:09:13:df:e5:9a:11:82:ba: 4d:db tools.sh: #258: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #259: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #260: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7d:16:ab:67:35:f1:ea:6f:b0:0e:63:6d:cd:01:60:7e Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:dc:02:39:f1:52:a5:6e:d9:ac:f1:ed:1e:76:78: ba:a9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #261: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #262: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #263: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5e:a5:f9:1c:6c:32:62:92:ff:a8:5c:20:a7:ab:fa:e5 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:96:77:f7:f1:1e:09:23:17:bd:2f:a4:60:92:82: 37:89 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #264: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #265: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #266: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 66:cc:0d:b0:58:cf:88:ac:c9:5c:80:ca:92:a2:d3:d2 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:45:78:f6:3d:57:de:bb:d5:32:cc:f8:26:17:8c: 04:2e tools.sh: #267: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1f:1b:20:14:28:3c:af:92:96:a1:b4:e8:a6:bb:3a:7d Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:33:ae:84:07:5d:4c:1c:5d:4c:5b:47:64:71:4a: b2:fd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #270: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #271: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #272: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fb:db:3a:82:90:a6:e6:ab:34:4f:9a:d5:93:80:35:69 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:32:6f:db:8a:40:f7:ce:af:3e:ae:4a:52:54:cc: a6:92 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #273: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #274: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #275: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d3:cd:47:dc:a1:bf:0f:fd:be:8d:36:c3:76:bb:c3:c0 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:a0:7c:94:57:1f:eb:23:bd:df:48:8a:83:c2:e4: 2c:cb tools.sh: #276: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #277: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #278: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 61:dd:de:3c:47:8f:5f:83:12:9d:3f:f5:60:0f:35:cf Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:c8:30:bf:8b:c4:44:d7:07:32:92:d6:e0:f5:cd: 74:df Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 38:d6:bd:b4:ac:f6:78:c8:02:0c:84:10:d7:7e:f6:7d Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:df:7c:96:5f:94:0b:b1:3a:64:61:57:a2:8c:6a: cc:43 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #282: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #283: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #284: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bb:c5:a3:86:9a:63:1f:07:18:7b:ec:a0:00:74:cf:61 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:ef:f5:6b:1f:31:bf:52:d0:cc:30:a8:ed:d1:58: 56:de tools.sh: #285: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #286: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #287: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b0:23:e2:72:6d:59:4a:e3:2a:8a:17:1e:2d:0f:da:13 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:d9:45:00:a3:48:09:92:92:96:8f:c4:73:96:a8: c5:f8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #288: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #289: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #290: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 04:94:4c:60:41:62:3d:fc:50:6f:a6:0b:df:90:c8:66 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:eb:b2:66:55:b5:df:72:77:1a:cf:87:8e:49:59: de:53 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ef:b6:ac:f0:71:08:7a:26:5a:bd:ad:98:2f:4e:f2:59 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:a1:7b:4b:58:fc:93:29:33:79:88:a3:da:a2:1e: 91:d6 tools.sh: #294: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #295: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #296: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: c6:9e:a1:81:7d:95:69:cb:c8:4d:60:02:12:80:0b:b7 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #297: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #298: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #299: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 29:a2:f7:e8:c5:25:3b:65:ea:de:64:17:5e:01:eb:b2 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #300: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #301: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #302: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 9f:c2:3c:e2:0d:cf:05:f7:e6:01:a3:2f:22:b9:76:17 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 16:b4:19:80:ac:0a:e5:a2:e0:fd:5b:ad:ac:f0:a7:75 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #306: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #307: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #308: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a4:7c:e4:1d:23:cf:ed:e0:a5:40:67:30:fc:45:91:be Iteration Count: 1 (0x1) tools.sh: #309: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #310: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #311: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 75:46:32:9b:4f:50:3a:50:1a:9e:b8:33:15:32:cd:1c Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #312: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #313: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #314: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: c4:35:11:29:43:64:ae:84:41:dd:89:58:5f:3b:0b:8b Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: cf:8b:83:82:ea:ed:79:0d:9d:d6:a1:45:46:1d:5e:be Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #318: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #319: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #320: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 0a:82:7a:62:d5:50:6b:dc:4f:02:ff:e0:ad:23:65:03 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #321: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #322: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #323: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 0c:bb:43:49:37:46:a8:de:b7:6e:b3:3e:39:65:03:99 Iteration Count: 1 (0x1) tools.sh: #324: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #325: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #326: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 87:92:47:a6:a5:84:df:fd:60:42:84:82:4a:a3:48:36 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e7:02:d3:44:45:d8:c5:e5:66:45:47:48:a9:30:0e:54 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #330: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #331: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #332: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 18:c3:07:75:15:66:48:5f:f5:91:16:29:d2:73:88:e7 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #333: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #334: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #335: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 72:15:aa:99:14:0f:84:4b:d5:d8:8e:3a:b3:90:1b:45 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #336: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #337: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #338: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f9:26:e4:8a:a1:b3:cd:5b:31:3a:08:7e:8c:a9:e0:95 Iteration Count: 1 (0x1) tools.sh: #339: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 62:aa:cb:0d:a3:bc:a7:84:ec:b9:cc:08:43:a6:e4:79 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #342: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #343: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #344: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f9:f5:73:62:a5:9a:96:ef:ec:db:74:57:90:cb:53:78 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #345: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #346: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #347: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c2:a1:1e:90:1e:97:d6:ab:bd:56:f5:e1:0b:d3:9c:aa Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #348: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #349: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #350: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7d:28:f6:15:57:a5:1c:0c:08:62:7c:c3:da:85:5d:19 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #351: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fc:41:94:aa:25:d0:7b:6c:8b:b5:ac:02:bf:2e:5c:cb Iteration Count: 1 (0x1) tools.sh: #354: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #355: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #356: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7b:64:d0:79:15:3d:9f:d7:a3:85:12:9d:d2:c4:f7:61 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #357: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #358: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #359: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2d:c8:cf:9c:ee:d7:85:7e:b2:17:c1:d7:73:0e:bc:65 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #360: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #361: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #362: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4c:f6:52:c8:bd:78:e5:ea:12:29:9c:db:d6:ef:b5:55 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1d:71:f0:19:c1:6b:28:a7:37:50:59:88:02:fc:12:95 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #366: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #367: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #368: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: af:da:91:23:d4:13:58:86:37:34:8d:1a:4a:1e:e5:27 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #369: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #370: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #371: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3d:61:3e:2f:12:77:46:f5:81:55:85:58:80:57:7d:0e Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #372: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #373: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #374: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ab:ad:d5:d0:a2:f8:80:19:c8:5a:6b:a6:5f:c3:07:8f Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8d:8f:5a:56:ec:03:a2:d6:80:a7:5a:35:7d:b8:dd:3b Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #378: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #379: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #380: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bf:fb:f7:02:3a:9a:3e:e0:0e:76:9b:d8:dc:7b:df:ae Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #381: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #382: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #383: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 67:53:66:84:af:f1:ef:10:c0:b2:84:bf:2b:28:d5:6b Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #384: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #385: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": security library: invalid algorithm. tools.sh: #386: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #387: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #388: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 55%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 54%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #389: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #390: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #391: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 55%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 54%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #392: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #393: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #394: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Mon Mar 26 17:35:46 EDT 2012 Running tests for fips TIMESTAMP fips BEGIN: Mon Mar 26 17:35:46 EDT 2012 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #395: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #396: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 687da02ce6aad71818726817abf959cae81b40f5 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #397: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect. fips.sh: #398: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #399: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #400: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #401: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #402: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #403: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #404: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #405: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #406: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #407: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 687da02ce6aad71818726817abf959cae81b40f5 FIPS_PUB_140_Test_Certificate fips.sh: #408: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #409: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #410: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #411: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #412: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 687da02ce6aad71818726817abf959cae81b40f5 FIPS_PUB_140_Test_Certificate fips.sh: #413: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #414: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #415: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x000bcf4d (773965): from 49 (73) to 69 (105) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/fips/mangle dbtest -r -d ../fips fips.sh: #416: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Mon Mar 26 17:36:01 EDT 2012 Running tests for sdr TIMESTAMP sdr BEGIN: Mon Mar 26 17:36:01 EDT 2012 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v1.30287 -t "Test1" sdr.sh: #417: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v2.30287 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #418: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v3.30287 -t "1234567" sdr.sh: #419: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v1.30287 -t "Test1" sdr.sh: #420: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v2.30287 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #421: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v3.30287 -t "1234567" sdr.sh: #422: Decrypt - Value 3 - PASSED TIMESTAMP sdr END: Mon Mar 26 17:36:01 EDT 2012 Running tests for crmf TIMESTAMP crmf BEGIN: Mon Mar 26 17:36:01 EDT 2012 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #423: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #424: CMMF test . - PASSED TIMESTAMP crmf END: Mon Mar 26 17:36:02 EDT 2012 Running tests for smime TIMESTAMP smime BEGIN: Mon Mar 26 17:36:02 EDT 2012 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #425: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #426: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #427: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #428: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #429: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #430: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #431: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #432: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #433: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #434: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #435: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #436: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #437: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #438: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #439: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #440: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #441: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #442: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #443: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #444: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #445: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #446: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #447: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #448: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #449: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #450: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #451: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #452: Decrypt with a Multiple Email cert . - PASSED smime.sh: #453: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #454: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #455: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #456: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #457: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #458: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #459: Decode Encrypted-Data . - PASSED smime.sh: #460: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #461: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #462: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #463: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #464: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #465: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Mon Mar 26 17:36:03 EDT 2012 Running tests for ssl TIMESTAMP ssl BEGIN: Mon Mar 26 17:36:03 EDT 2012 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 11834 >/dev/null 2>/dev/null selfserv_9280 with PID 11834 found at Mon Mar 26 17:36:03 EDT 2012 selfserv_9280 with PID 11834 started at Mon Mar 26 17:36:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #466: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 11834 at Mon Mar 26 17:36:04 EDT 2012 kill -USR1 11834 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 11834 killed at Mon Mar 26 17:36:04 EDT 2012 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 11890 >/dev/null 2>/dev/null selfserv_9280 with PID 11890 found at Mon Mar 26 17:36:04 EDT 2012 selfserv_9280 with PID 11890 started at Mon Mar 26 17:36:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #467: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 11890 at Mon Mar 26 17:36:04 EDT 2012 kill -USR1 11890 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 11890 killed at Mon Mar 26 17:36:04 EDT 2012 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 11946 >/dev/null 2>/dev/null selfserv_9280 with PID 11946 found at Mon Mar 26 17:36:04 EDT 2012 selfserv_9280 with PID 11946 started at Mon Mar 26 17:36:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #468: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 11946 at Mon Mar 26 17:36:04 EDT 2012 kill -USR1 11946 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 11946 killed at Mon Mar 26 17:36:04 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12014 >/dev/null 2>/dev/null selfserv_9280 with PID 12014 found at Mon Mar 26 17:36:04 EDT 2012 selfserv_9280 with PID 12014 started at Mon Mar 26 17:36:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #469: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 12014 at Mon Mar 26 17:36:04 EDT 2012 kill -USR1 12014 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12014 killed at Mon Mar 26 17:36:04 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12070 >/dev/null 2>/dev/null selfserv_9280 with PID 12070 found at Mon Mar 26 17:36:04 EDT 2012 selfserv_9280 with PID 12070 started at Mon Mar 26 17:36:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #470: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 12070 at Mon Mar 26 17:36:04 EDT 2012 kill -USR1 12070 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12070 killed at Mon Mar 26 17:36:04 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12126 >/dev/null 2>/dev/null selfserv_9280 with PID 12126 found at Mon Mar 26 17:36:04 EDT 2012 selfserv_9280 with PID 12126 started at Mon Mar 26 17:36:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #471: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 12126 at Mon Mar 26 17:36:05 EDT 2012 kill -USR1 12126 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12126 killed at Mon Mar 26 17:36:05 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12194 >/dev/null 2>/dev/null selfserv_9280 with PID 12194 found at Mon Mar 26 17:36:05 EDT 2012 selfserv_9280 with PID 12194 started at Mon Mar 26 17:36:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #472: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 12194 at Mon Mar 26 17:36:05 EDT 2012 kill -USR1 12194 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12194 killed at Mon Mar 26 17:36:05 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12250 >/dev/null 2>/dev/null selfserv_9280 with PID 12250 found at Mon Mar 26 17:36:05 EDT 2012 selfserv_9280 with PID 12250 started at Mon Mar 26 17:36:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #473: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 12250 at Mon Mar 26 17:36:05 EDT 2012 kill -USR1 12250 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12250 killed at Mon Mar 26 17:36:05 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12306 >/dev/null 2>/dev/null selfserv_9280 with PID 12306 found at Mon Mar 26 17:36:05 EDT 2012 selfserv_9280 with PID 12306 started at Mon Mar 26 17:36:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #474: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 12306 at Mon Mar 26 17:36:05 EDT 2012 kill -USR1 12306 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12306 killed at Mon Mar 26 17:36:05 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12374 >/dev/null 2>/dev/null selfserv_9280 with PID 12374 found at Mon Mar 26 17:36:05 EDT 2012 selfserv_9280 with PID 12374 started at Mon Mar 26 17:36:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #475: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 12374 at Mon Mar 26 17:36:05 EDT 2012 kill -USR1 12374 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12374 killed at Mon Mar 26 17:36:05 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12430 >/dev/null 2>/dev/null selfserv_9280 with PID 12430 found at Mon Mar 26 17:36:05 EDT 2012 selfserv_9280 with PID 12430 started at Mon Mar 26 17:36:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #476: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 12430 at Mon Mar 26 17:36:06 EDT 2012 kill -USR1 12430 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12430 killed at Mon Mar 26 17:36:06 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12486 >/dev/null 2>/dev/null selfserv_9280 with PID 12486 found at Mon Mar 26 17:36:06 EDT 2012 selfserv_9280 with PID 12486 started at Mon Mar 26 17:36:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #477: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 12486 at Mon Mar 26 17:36:06 EDT 2012 kill -USR1 12486 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12486 killed at Mon Mar 26 17:36:06 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12554 >/dev/null 2>/dev/null selfserv_9280 with PID 12554 found at Mon Mar 26 17:36:06 EDT 2012 selfserv_9280 with PID 12554 started at Mon Mar 26 17:36:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #478: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 12554 at Mon Mar 26 17:36:06 EDT 2012 kill -USR1 12554 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12554 killed at Mon Mar 26 17:36:06 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12610 >/dev/null 2>/dev/null selfserv_9280 with PID 12610 found at Mon Mar 26 17:36:06 EDT 2012 selfserv_9280 with PID 12610 started at Mon Mar 26 17:36:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #479: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 12610 at Mon Mar 26 17:36:06 EDT 2012 kill -USR1 12610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12610 killed at Mon Mar 26 17:36:06 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12666 >/dev/null 2>/dev/null selfserv_9280 with PID 12666 found at Mon Mar 26 17:36:06 EDT 2012 selfserv_9280 with PID 12666 started at Mon Mar 26 17:36:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #480: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 12666 at Mon Mar 26 17:36:06 EDT 2012 kill -USR1 12666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12666 killed at Mon Mar 26 17:36:06 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12737 >/dev/null 2>/dev/null selfserv_9280 with PID 12737 found at Mon Mar 26 17:36:06 EDT 2012 selfserv_9280 with PID 12737 started at Mon Mar 26 17:36:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #481: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 12737 at Mon Mar 26 17:36:06 EDT 2012 kill -USR1 12737 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12737 killed at Mon Mar 26 17:36:06 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12793 >/dev/null 2>/dev/null selfserv_9280 with PID 12793 found at Mon Mar 26 17:36:06 EDT 2012 selfserv_9280 with PID 12793 started at Mon Mar 26 17:36:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #482: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 12793 at Mon Mar 26 17:36:07 EDT 2012 kill -USR1 12793 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12793 killed at Mon Mar 26 17:36:07 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:07 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12849 >/dev/null 2>/dev/null selfserv_9280 with PID 12849 found at Mon Mar 26 17:36:07 EDT 2012 selfserv_9280 with PID 12849 started at Mon Mar 26 17:36:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #483: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 12849 at Mon Mar 26 17:36:07 EDT 2012 kill -USR1 12849 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12849 killed at Mon Mar 26 17:36:07 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:07 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12917 >/dev/null 2>/dev/null selfserv_9280 with PID 12917 found at Mon Mar 26 17:36:07 EDT 2012 selfserv_9280 with PID 12917 started at Mon Mar 26 17:36:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #484: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 12917 at Mon Mar 26 17:36:07 EDT 2012 kill -USR1 12917 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12917 killed at Mon Mar 26 17:36:07 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:07 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12973 >/dev/null 2>/dev/null selfserv_9280 with PID 12973 found at Mon Mar 26 17:36:07 EDT 2012 selfserv_9280 with PID 12973 started at Mon Mar 26 17:36:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #485: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 12973 at Mon Mar 26 17:36:07 EDT 2012 kill -USR1 12973 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12973 killed at Mon Mar 26 17:36:07 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:07 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13029 >/dev/null 2>/dev/null selfserv_9280 with PID 13029 found at Mon Mar 26 17:36:07 EDT 2012 selfserv_9280 with PID 13029 started at Mon Mar 26 17:36:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #486: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13029 at Mon Mar 26 17:36:07 EDT 2012 kill -USR1 13029 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13029 killed at Mon Mar 26 17:36:07 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:07 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13097 >/dev/null 2>/dev/null selfserv_9280 with PID 13097 found at Mon Mar 26 17:36:07 EDT 2012 selfserv_9280 with PID 13097 started at Mon Mar 26 17:36:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #487: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13097 at Mon Mar 26 17:36:08 EDT 2012 kill -USR1 13097 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13097 killed at Mon Mar 26 17:36:08 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13153 >/dev/null 2>/dev/null selfserv_9280 with PID 13153 found at Mon Mar 26 17:36:08 EDT 2012 selfserv_9280 with PID 13153 started at Mon Mar 26 17:36:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #488: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13153 at Mon Mar 26 17:36:08 EDT 2012 kill -USR1 13153 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13153 killed at Mon Mar 26 17:36:08 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13209 >/dev/null 2>/dev/null selfserv_9280 with PID 13209 found at Mon Mar 26 17:36:08 EDT 2012 selfserv_9280 with PID 13209 started at Mon Mar 26 17:36:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #489: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13209 at Mon Mar 26 17:36:08 EDT 2012 kill -USR1 13209 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13209 killed at Mon Mar 26 17:36:08 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13277 >/dev/null 2>/dev/null selfserv_9280 with PID 13277 found at Mon Mar 26 17:36:08 EDT 2012 selfserv_9280 with PID 13277 started at Mon Mar 26 17:36:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #490: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 13277 at Mon Mar 26 17:36:08 EDT 2012 kill -USR1 13277 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13277 killed at Mon Mar 26 17:36:08 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13333 >/dev/null 2>/dev/null selfserv_9280 with PID 13333 found at Mon Mar 26 17:36:08 EDT 2012 selfserv_9280 with PID 13333 started at Mon Mar 26 17:36:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #491: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13333 at Mon Mar 26 17:36:08 EDT 2012 kill -USR1 13333 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13333 killed at Mon Mar 26 17:36:08 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13389 >/dev/null 2>/dev/null selfserv_9280 with PID 13389 found at Mon Mar 26 17:36:08 EDT 2012 selfserv_9280 with PID 13389 started at Mon Mar 26 17:36:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #492: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 13389 at Mon Mar 26 17:36:08 EDT 2012 kill -USR1 13389 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13389 killed at Mon Mar 26 17:36:08 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13457 >/dev/null 2>/dev/null selfserv_9280 with PID 13457 found at Mon Mar 26 17:36:09 EDT 2012 selfserv_9280 with PID 13457 started at Mon Mar 26 17:36:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #493: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 13457 at Mon Mar 26 17:36:09 EDT 2012 kill -USR1 13457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13457 killed at Mon Mar 26 17:36:09 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13513 >/dev/null 2>/dev/null selfserv_9280 with PID 13513 found at Mon Mar 26 17:36:09 EDT 2012 selfserv_9280 with PID 13513 started at Mon Mar 26 17:36:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #494: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 13513 at Mon Mar 26 17:36:09 EDT 2012 kill -USR1 13513 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13513 killed at Mon Mar 26 17:36:09 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13569 >/dev/null 2>/dev/null selfserv_9280 with PID 13569 found at Mon Mar 26 17:36:09 EDT 2012 selfserv_9280 with PID 13569 started at Mon Mar 26 17:36:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #495: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 13569 at Mon Mar 26 17:36:09 EDT 2012 kill -USR1 13569 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13569 killed at Mon Mar 26 17:36:09 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13637 >/dev/null 2>/dev/null selfserv_9280 with PID 13637 found at Mon Mar 26 17:36:09 EDT 2012 selfserv_9280 with PID 13637 started at Mon Mar 26 17:36:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #496: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 13637 at Mon Mar 26 17:36:09 EDT 2012 kill -USR1 13637 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13637 killed at Mon Mar 26 17:36:09 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13693 >/dev/null 2>/dev/null selfserv_9280 with PID 13693 found at Mon Mar 26 17:36:09 EDT 2012 selfserv_9280 with PID 13693 started at Mon Mar 26 17:36:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #497: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 13693 at Mon Mar 26 17:36:09 EDT 2012 kill -USR1 13693 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13693 killed at Mon Mar 26 17:36:09 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13749 >/dev/null 2>/dev/null selfserv_9280 with PID 13749 found at Mon Mar 26 17:36:10 EDT 2012 selfserv_9280 with PID 13749 started at Mon Mar 26 17:36:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #498: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 13749 at Mon Mar 26 17:36:10 EDT 2012 kill -USR1 13749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13749 killed at Mon Mar 26 17:36:10 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13817 >/dev/null 2>/dev/null selfserv_9280 with PID 13817 found at Mon Mar 26 17:36:10 EDT 2012 selfserv_9280 with PID 13817 started at Mon Mar 26 17:36:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #499: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 13817 at Mon Mar 26 17:36:10 EDT 2012 kill -USR1 13817 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13817 killed at Mon Mar 26 17:36:10 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13873 >/dev/null 2>/dev/null selfserv_9280 with PID 13873 found at Mon Mar 26 17:36:10 EDT 2012 selfserv_9280 with PID 13873 started at Mon Mar 26 17:36:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #500: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13873 at Mon Mar 26 17:36:10 EDT 2012 kill -USR1 13873 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13873 killed at Mon Mar 26 17:36:10 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13929 >/dev/null 2>/dev/null selfserv_9280 with PID 13929 found at Mon Mar 26 17:36:10 EDT 2012 selfserv_9280 with PID 13929 started at Mon Mar 26 17:36:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #501: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 13929 at Mon Mar 26 17:36:10 EDT 2012 kill -USR1 13929 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13929 killed at Mon Mar 26 17:36:10 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13997 >/dev/null 2>/dev/null selfserv_9280 with PID 13997 found at Mon Mar 26 17:36:10 EDT 2012 selfserv_9280 with PID 13997 started at Mon Mar 26 17:36:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #502: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13997 at Mon Mar 26 17:36:10 EDT 2012 kill -USR1 13997 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13997 killed at Mon Mar 26 17:36:10 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14053 >/dev/null 2>/dev/null selfserv_9280 with PID 14053 found at Mon Mar 26 17:36:10 EDT 2012 selfserv_9280 with PID 14053 started at Mon Mar 26 17:36:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #503: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14053 at Mon Mar 26 17:36:11 EDT 2012 kill -USR1 14053 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14053 killed at Mon Mar 26 17:36:11 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:11 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14109 >/dev/null 2>/dev/null selfserv_9280 with PID 14109 found at Mon Mar 26 17:36:11 EDT 2012 selfserv_9280 with PID 14109 started at Mon Mar 26 17:36:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #504: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14109 at Mon Mar 26 17:36:11 EDT 2012 kill -USR1 14109 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14109 killed at Mon Mar 26 17:36:11 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:11 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14177 >/dev/null 2>/dev/null selfserv_9280 with PID 14177 found at Mon Mar 26 17:36:11 EDT 2012 selfserv_9280 with PID 14177 started at Mon Mar 26 17:36:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #505: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14177 at Mon Mar 26 17:36:11 EDT 2012 kill -USR1 14177 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14177 killed at Mon Mar 26 17:36:11 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:11 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14233 >/dev/null 2>/dev/null selfserv_9280 with PID 14233 found at Mon Mar 26 17:36:11 EDT 2012 selfserv_9280 with PID 14233 started at Mon Mar 26 17:36:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #506: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14233 at Mon Mar 26 17:36:11 EDT 2012 kill -USR1 14233 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14233 killed at Mon Mar 26 17:36:11 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:11 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14289 >/dev/null 2>/dev/null selfserv_9280 with PID 14289 found at Mon Mar 26 17:36:11 EDT 2012 selfserv_9280 with PID 14289 started at Mon Mar 26 17:36:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #507: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14289 at Mon Mar 26 17:36:11 EDT 2012 kill -USR1 14289 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14289 killed at Mon Mar 26 17:36:11 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:11 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14357 >/dev/null 2>/dev/null selfserv_9280 with PID 14357 found at Mon Mar 26 17:36:11 EDT 2012 selfserv_9280 with PID 14357 started at Mon Mar 26 17:36:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #508: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 14357 at Mon Mar 26 17:36:12 EDT 2012 kill -USR1 14357 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14357 killed at Mon Mar 26 17:36:12 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14413 >/dev/null 2>/dev/null selfserv_9280 with PID 14413 found at Mon Mar 26 17:36:12 EDT 2012 selfserv_9280 with PID 14413 started at Mon Mar 26 17:36:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #509: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14413 at Mon Mar 26 17:36:12 EDT 2012 kill -USR1 14413 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14413 killed at Mon Mar 26 17:36:12 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14469 >/dev/null 2>/dev/null selfserv_9280 with PID 14469 found at Mon Mar 26 17:36:12 EDT 2012 selfserv_9280 with PID 14469 started at Mon Mar 26 17:36:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #510: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 14469 at Mon Mar 26 17:36:12 EDT 2012 kill -USR1 14469 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14469 killed at Mon Mar 26 17:36:12 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14537 >/dev/null 2>/dev/null selfserv_9280 with PID 14537 found at Mon Mar 26 17:36:12 EDT 2012 selfserv_9280 with PID 14537 started at Mon Mar 26 17:36:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #511: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 14537 at Mon Mar 26 17:36:12 EDT 2012 kill -USR1 14537 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14537 killed at Mon Mar 26 17:36:12 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14593 >/dev/null 2>/dev/null selfserv_9280 with PID 14593 found at Mon Mar 26 17:36:12 EDT 2012 selfserv_9280 with PID 14593 started at Mon Mar 26 17:36:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #512: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 14593 at Mon Mar 26 17:36:12 EDT 2012 kill -USR1 14593 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14593 killed at Mon Mar 26 17:36:12 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14649 >/dev/null 2>/dev/null selfserv_9280 with PID 14649 found at Mon Mar 26 17:36:12 EDT 2012 selfserv_9280 with PID 14649 started at Mon Mar 26 17:36:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #513: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 14649 at Mon Mar 26 17:36:13 EDT 2012 kill -USR1 14649 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14649 killed at Mon Mar 26 17:36:13 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:13 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14717 >/dev/null 2>/dev/null selfserv_9280 with PID 14717 found at Mon Mar 26 17:36:13 EDT 2012 selfserv_9280 with PID 14717 started at Mon Mar 26 17:36:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #514: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 14717 at Mon Mar 26 17:36:13 EDT 2012 kill -USR1 14717 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14717 killed at Mon Mar 26 17:36:13 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:13 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14773 >/dev/null 2>/dev/null selfserv_9280 with PID 14773 found at Mon Mar 26 17:36:13 EDT 2012 selfserv_9280 with PID 14773 started at Mon Mar 26 17:36:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #515: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 14773 at Mon Mar 26 17:36:13 EDT 2012 kill -USR1 14773 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14773 killed at Mon Mar 26 17:36:13 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:13 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14829 >/dev/null 2>/dev/null selfserv_9280 with PID 14829 found at Mon Mar 26 17:36:13 EDT 2012 selfserv_9280 with PID 14829 started at Mon Mar 26 17:36:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #516: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 14829 at Mon Mar 26 17:36:13 EDT 2012 kill -USR1 14829 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14829 killed at Mon Mar 26 17:36:13 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:13 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14897 >/dev/null 2>/dev/null selfserv_9280 with PID 14897 found at Mon Mar 26 17:36:13 EDT 2012 selfserv_9280 with PID 14897 started at Mon Mar 26 17:36:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #517: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 14897 at Mon Mar 26 17:36:13 EDT 2012 kill -USR1 14897 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14897 killed at Mon Mar 26 17:36:13 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:13 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14953 >/dev/null 2>/dev/null selfserv_9280 with PID 14953 found at Mon Mar 26 17:36:13 EDT 2012 selfserv_9280 with PID 14953 started at Mon Mar 26 17:36:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #518: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14953 at Mon Mar 26 17:36:14 EDT 2012 kill -USR1 14953 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14953 killed at Mon Mar 26 17:36:14 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15009 >/dev/null 2>/dev/null selfserv_9280 with PID 15009 found at Mon Mar 26 17:36:14 EDT 2012 selfserv_9280 with PID 15009 started at Mon Mar 26 17:36:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #519: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 15009 at Mon Mar 26 17:36:14 EDT 2012 kill -USR1 15009 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15009 killed at Mon Mar 26 17:36:14 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15077 >/dev/null 2>/dev/null selfserv_9280 with PID 15077 found at Mon Mar 26 17:36:14 EDT 2012 selfserv_9280 with PID 15077 started at Mon Mar 26 17:36:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #520: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15077 at Mon Mar 26 17:36:14 EDT 2012 kill -USR1 15077 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15077 killed at Mon Mar 26 17:36:14 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15136 >/dev/null 2>/dev/null selfserv_9280 with PID 15136 found at Mon Mar 26 17:36:14 EDT 2012 selfserv_9280 with PID 15136 started at Mon Mar 26 17:36:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #521: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15136 at Mon Mar 26 17:36:14 EDT 2012 kill -USR1 15136 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15136 killed at Mon Mar 26 17:36:14 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15192 >/dev/null 2>/dev/null selfserv_9280 with PID 15192 found at Mon Mar 26 17:36:14 EDT 2012 selfserv_9280 with PID 15192 started at Mon Mar 26 17:36:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #522: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15192 at Mon Mar 26 17:36:14 EDT 2012 kill -USR1 15192 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15192 killed at Mon Mar 26 17:36:14 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15260 >/dev/null 2>/dev/null selfserv_9280 with PID 15260 found at Mon Mar 26 17:36:14 EDT 2012 selfserv_9280 with PID 15260 started at Mon Mar 26 17:36:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #523: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15260 at Mon Mar 26 17:36:14 EDT 2012 kill -USR1 15260 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15260 killed at Mon Mar 26 17:36:14 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15316 >/dev/null 2>/dev/null selfserv_9280 with PID 15316 found at Mon Mar 26 17:36:15 EDT 2012 selfserv_9280 with PID 15316 started at Mon Mar 26 17:36:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #524: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15316 at Mon Mar 26 17:36:15 EDT 2012 kill -USR1 15316 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15316 killed at Mon Mar 26 17:36:15 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15372 >/dev/null 2>/dev/null selfserv_9280 with PID 15372 found at Mon Mar 26 17:36:15 EDT 2012 selfserv_9280 with PID 15372 started at Mon Mar 26 17:36:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #525: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15372 at Mon Mar 26 17:36:15 EDT 2012 kill -USR1 15372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15372 killed at Mon Mar 26 17:36:15 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15440 >/dev/null 2>/dev/null selfserv_9280 with PID 15440 found at Mon Mar 26 17:36:15 EDT 2012 selfserv_9280 with PID 15440 started at Mon Mar 26 17:36:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #526: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 15440 at Mon Mar 26 17:36:15 EDT 2012 kill -USR1 15440 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15440 killed at Mon Mar 26 17:36:15 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15496 >/dev/null 2>/dev/null selfserv_9280 with PID 15496 found at Mon Mar 26 17:36:15 EDT 2012 selfserv_9280 with PID 15496 started at Mon Mar 26 17:36:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #527: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15496 at Mon Mar 26 17:36:15 EDT 2012 kill -USR1 15496 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15496 killed at Mon Mar 26 17:36:15 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15552 >/dev/null 2>/dev/null selfserv_9280 with PID 15552 found at Mon Mar 26 17:36:15 EDT 2012 selfserv_9280 with PID 15552 started at Mon Mar 26 17:36:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #528: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 15552 at Mon Mar 26 17:36:15 EDT 2012 kill -USR1 15552 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15552 killed at Mon Mar 26 17:36:15 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15620 >/dev/null 2>/dev/null selfserv_9280 with PID 15620 found at Mon Mar 26 17:36:15 EDT 2012 selfserv_9280 with PID 15620 started at Mon Mar 26 17:36:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 15620 at Mon Mar 26 17:36:16 EDT 2012 kill -USR1 15620 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15620 killed at Mon Mar 26 17:36:16 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15676 >/dev/null 2>/dev/null selfserv_9280 with PID 15676 found at Mon Mar 26 17:36:16 EDT 2012 selfserv_9280 with PID 15676 started at Mon Mar 26 17:36:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 15676 at Mon Mar 26 17:36:16 EDT 2012 kill -USR1 15676 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15676 killed at Mon Mar 26 17:36:16 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15732 >/dev/null 2>/dev/null selfserv_9280 with PID 15732 found at Mon Mar 26 17:36:16 EDT 2012 selfserv_9280 with PID 15732 started at Mon Mar 26 17:36:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 15732 at Mon Mar 26 17:36:16 EDT 2012 kill -USR1 15732 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15732 killed at Mon Mar 26 17:36:16 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15800 >/dev/null 2>/dev/null selfserv_9280 with PID 15800 found at Mon Mar 26 17:36:16 EDT 2012 selfserv_9280 with PID 15800 started at Mon Mar 26 17:36:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #532: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 15800 at Mon Mar 26 17:36:16 EDT 2012 kill -USR1 15800 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15800 killed at Mon Mar 26 17:36:16 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15856 >/dev/null 2>/dev/null selfserv_9280 with PID 15856 found at Mon Mar 26 17:36:16 EDT 2012 selfserv_9280 with PID 15856 started at Mon Mar 26 17:36:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #533: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 15856 at Mon Mar 26 17:36:16 EDT 2012 kill -USR1 15856 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15856 killed at Mon Mar 26 17:36:16 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15912 >/dev/null 2>/dev/null selfserv_9280 with PID 15912 found at Mon Mar 26 17:36:16 EDT 2012 selfserv_9280 with PID 15912 started at Mon Mar 26 17:36:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #534: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 15912 at Mon Mar 26 17:36:17 EDT 2012 kill -USR1 15912 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15912 killed at Mon Mar 26 17:36:17 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15980 >/dev/null 2>/dev/null selfserv_9280 with PID 15980 found at Mon Mar 26 17:36:17 EDT 2012 selfserv_9280 with PID 15980 started at Mon Mar 26 17:36:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #535: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 15980 at Mon Mar 26 17:36:17 EDT 2012 kill -USR1 15980 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15980 killed at Mon Mar 26 17:36:17 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16036 >/dev/null 2>/dev/null selfserv_9280 with PID 16036 found at Mon Mar 26 17:36:17 EDT 2012 selfserv_9280 with PID 16036 started at Mon Mar 26 17:36:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #536: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 16036 at Mon Mar 26 17:36:17 EDT 2012 kill -USR1 16036 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16036 killed at Mon Mar 26 17:36:17 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16092 >/dev/null 2>/dev/null selfserv_9280 with PID 16092 found at Mon Mar 26 17:36:17 EDT 2012 selfserv_9280 with PID 16092 started at Mon Mar 26 17:36:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #537: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 16092 at Mon Mar 26 17:36:17 EDT 2012 kill -USR1 16092 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16092 killed at Mon Mar 26 17:36:17 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/authin.tl.tmp 0 selfserv_9280 starting at Mon Mar 26 17:36:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:17 EDT 2012 selfserv_9280 with PID 16164 started at Mon Mar 26 17:36:17 EDT 2012 Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:17 EDT 2012 ssl.sh: #538: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:17 EDT 2012 ssl.sh: #539: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:17 EDT 2012 ssl.sh: #540: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:18 EDT 2012 ssl.sh: #541: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:18 EDT 2012 ssl.sh: #542: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:18 EDT 2012 ssl.sh: #543: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:18 EDT 2012 ssl.sh: #544: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:18 EDT 2012 ssl.sh: #545: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:18 EDT 2012 ssl.sh: #546: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:18 EDT 2012 ssl.sh: #547: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:18 EDT 2012 ssl.sh: #548: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:18 EDT 2012 ssl.sh: #549: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:18 EDT 2012 ssl.sh: #550: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:18 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #551: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:18 EDT 2012 ssl.sh: #552: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:18 EDT 2012 ssl.sh: #553: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:18 EDT 2012 ssl.sh: #554: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:19 EDT 2012 ssl.sh: #555: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:19 EDT 2012 ssl.sh: #556: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:19 EDT 2012 ssl.sh: #557: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:19 EDT 2012 ssl.sh: #558: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:19 EDT 2012 ssl.sh: #559: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:19 EDT 2012 ssl.sh: #560: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:19 EDT 2012 ssl.sh: #561: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:19 EDT 2012 ssl.sh: #562: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:19 EDT 2012 ssl.sh: #563: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:19 EDT 2012 ssl.sh: #564: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:19 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #565: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:19 EDT 2012 ssl.sh: #566: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:19 EDT 2012 ssl.sh: #567: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:19 EDT 2012 ssl.sh: #568: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:19 EDT 2012 ssl.sh: #569: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:20 EDT 2012 ssl.sh: #570: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:20 EDT 2012 ssl.sh: #571: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:20 EDT 2012 ssl.sh: #572: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:20 EDT 2012 ssl.sh: #573: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:20 EDT 2012 ssl.sh: #574: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:20 EDT 2012 ssl.sh: #575: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:20 EDT 2012 ssl.sh: #576: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:20 EDT 2012 ssl.sh: #577: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:36:20 EDT 2012 ssl.sh: #578: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 16164 at Mon Mar 26 17:36:20 EDT 2012 kill -USR1 16164 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16164 killed at Mon Mar 26 17:36:20 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:20 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:20 EDT 2012 selfserv_9280 with PID 17586 started at Mon Mar 26 17:36:20 EDT 2012 Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:20 EDT 2012 ssl.sh: #579: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:20 EDT 2012 ssl.sh: #580: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:20 EDT 2012 ssl.sh: #581: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:21 EDT 2012 ssl.sh: #582: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:21 EDT 2012 ssl.sh: #583: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:21 EDT 2012 ssl.sh: #584: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:21 EDT 2012 ssl.sh: #585: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:21 EDT 2012 ssl.sh: #586: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:21 EDT 2012 ssl.sh: #587: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:21 EDT 2012 ssl.sh: #588: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:21 EDT 2012 ssl.sh: #589: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:21 EDT 2012 ssl.sh: #590: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:21 EDT 2012 ssl.sh: #591: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:21 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #592: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:21 EDT 2012 ssl.sh: #593: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:21 EDT 2012 ssl.sh: #594: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:21 EDT 2012 ssl.sh: #595: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:22 EDT 2012 ssl.sh: #596: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:22 EDT 2012 ssl.sh: #597: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:22 EDT 2012 ssl.sh: #598: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:22 EDT 2012 ssl.sh: #599: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:22 EDT 2012 ssl.sh: #600: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:22 EDT 2012 ssl.sh: #601: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:22 EDT 2012 ssl.sh: #602: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:22 EDT 2012 ssl.sh: #603: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:22 EDT 2012 ssl.sh: #604: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:22 EDT 2012 ssl.sh: #605: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:22 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #606: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:22 EDT 2012 ssl.sh: #607: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:22 EDT 2012 ssl.sh: #608: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:22 EDT 2012 ssl.sh: #609: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:23 EDT 2012 ssl.sh: #610: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:23 EDT 2012 ssl.sh: #611: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:23 EDT 2012 ssl.sh: #612: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:23 EDT 2012 ssl.sh: #613: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:23 EDT 2012 ssl.sh: #614: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:23 EDT 2012 ssl.sh: #615: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:23 EDT 2012 ssl.sh: #616: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:23 EDT 2012 ssl.sh: #617: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:23 EDT 2012 ssl.sh: #618: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17586 >/dev/null 2>/dev/null selfserv_9280 with PID 17586 found at Mon Mar 26 17:36:23 EDT 2012 ssl.sh: #619: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 17586 at Mon Mar 26 17:36:23 EDT 2012 kill -USR1 17586 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17586 killed at Mon Mar 26 17:36:23 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19006 >/dev/null 2>/dev/null selfserv_9280 with PID 19006 found at Mon Mar 26 17:36:23 EDT 2012 selfserv_9280 with PID 19006 started at Mon Mar 26 17:36:23 EDT 2012 ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) trying to kill selfserv_9280 with PID 19006 at Mon Mar 26 17:36:23 EDT 2012 kill -USR1 19006 ./ssl.sh: line 207: 19006 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9280 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19006 killed at Mon Mar 26 17:36:23 EDT 2012 selfserv_9280 starting at Mon Mar 26 17:36:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:23 EDT 2012 selfserv_9280 with PID 19048 started at Mon Mar 26 17:36:23 EDT 2012 Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:23 EDT 2012 ssl.sh: #620: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:24 EDT 2012 ssl.sh: #621: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:24 EDT 2012 ssl.sh: #622: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:24 EDT 2012 ssl.sh: #623: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:24 EDT 2012 ssl.sh: #624: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:24 EDT 2012 ssl.sh: #625: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:24 EDT 2012 ssl.sh: #626: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:24 EDT 2012 ssl.sh: #627: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:24 EDT 2012 ssl.sh: #628: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:24 EDT 2012 ssl.sh: #629: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:24 EDT 2012 ssl.sh: #630: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:24 EDT 2012 ssl.sh: #631: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:24 EDT 2012 ssl.sh: #632: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:24 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #633: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:25 EDT 2012 ssl.sh: #634: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:25 EDT 2012 ssl.sh: #635: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:25 EDT 2012 ssl.sh: #636: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:25 EDT 2012 ssl.sh: #637: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:25 EDT 2012 ssl.sh: #638: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:25 EDT 2012 ssl.sh: #639: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:25 EDT 2012 ssl.sh: #640: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:25 EDT 2012 ssl.sh: #641: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:25 EDT 2012 ssl.sh: #642: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:25 EDT 2012 ssl.sh: #643: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:25 EDT 2012 ssl.sh: #644: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:25 EDT 2012 ssl.sh: #645: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:25 EDT 2012 ssl.sh: #646: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:26 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #647: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:26 EDT 2012 ssl.sh: #648: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:26 EDT 2012 ssl.sh: #649: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:26 EDT 2012 ssl.sh: #650: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:26 EDT 2012 ssl.sh: #651: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:26 EDT 2012 ssl.sh: #652: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:26 EDT 2012 ssl.sh: #653: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:26 EDT 2012 ssl.sh: #654: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:26 EDT 2012 ssl.sh: #655: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:26 EDT 2012 ssl.sh: #656: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:26 EDT 2012 ssl.sh: #657: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:26 EDT 2012 ssl.sh: #658: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:26 EDT 2012 ssl.sh: #659: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 19048 >/dev/null 2>/dev/null selfserv_9280 with PID 19048 found at Mon Mar 26 17:36:27 EDT 2012 ssl.sh: #660: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 19048 at Mon Mar 26 17:36:27 EDT 2012 kill -USR1 19048 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19048 killed at Mon Mar 26 17:36:27 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:27 EDT 2012 selfserv_9280 with PID 20468 started at Mon Mar 26 17:36:27 EDT 2012 Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:27 EDT 2012 ssl.sh: #661: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:27 EDT 2012 ssl.sh: #662: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:27 EDT 2012 ssl.sh: #663: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:27 EDT 2012 ssl.sh: #664: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:27 EDT 2012 ssl.sh: #665: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:27 EDT 2012 ssl.sh: #666: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:27 EDT 2012 ssl.sh: #667: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:27 EDT 2012 ssl.sh: #668: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:27 EDT 2012 ssl.sh: #669: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:27 EDT 2012 ssl.sh: #670: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:28 EDT 2012 ssl.sh: #671: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:28 EDT 2012 ssl.sh: #672: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:28 EDT 2012 ssl.sh: #673: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:28 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #674: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:28 EDT 2012 ssl.sh: #675: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:28 EDT 2012 ssl.sh: #676: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:28 EDT 2012 ssl.sh: #677: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:28 EDT 2012 ssl.sh: #678: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:28 EDT 2012 ssl.sh: #679: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:28 EDT 2012 ssl.sh: #680: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:28 EDT 2012 ssl.sh: #681: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:28 EDT 2012 ssl.sh: #682: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:28 EDT 2012 ssl.sh: #683: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:29 EDT 2012 ssl.sh: #684: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:29 EDT 2012 ssl.sh: #685: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:29 EDT 2012 ssl.sh: #686: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:29 EDT 2012 ssl.sh: #687: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:29 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #688: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:29 EDT 2012 ssl.sh: #689: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:29 EDT 2012 ssl.sh: #690: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:29 EDT 2012 ssl.sh: #691: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:29 EDT 2012 ssl.sh: #692: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:29 EDT 2012 ssl.sh: #693: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:29 EDT 2012 ssl.sh: #694: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:29 EDT 2012 ssl.sh: #695: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:29 EDT 2012 ssl.sh: #696: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:30 EDT 2012 ssl.sh: #697: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:30 EDT 2012 ssl.sh: #698: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:30 EDT 2012 ssl.sh: #699: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:30 EDT 2012 ssl.sh: #700: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20468 >/dev/null 2>/dev/null selfserv_9280 with PID 20468 found at Mon Mar 26 17:36:30 EDT 2012 ssl.sh: #701: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 20468 at Mon Mar 26 17:36:30 EDT 2012 kill -USR1 20468 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20468 killed at Mon Mar 26 17:36:30 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 21894 >/dev/null 2>/dev/null selfserv_9280 with PID 21894 found at Mon Mar 26 17:36:30 EDT 2012 selfserv_9280 with PID 21894 started at Mon Mar 26 17:36:30 EDT 2012 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9280 with PID 21894 at Mon Mar 26 17:36:30 EDT 2012 kill -USR1 21894 ./ssl.sh: line 207: 21894 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9280 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 21894 killed at Mon Mar 26 17:36:30 EDT 2012 selfserv_9280 starting at Mon Mar 26 17:36:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:30 EDT 2012 selfserv_9280 with PID 21936 started at Mon Mar 26 17:36:30 EDT 2012 Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:30 EDT 2012 ssl.sh: #702: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:30 EDT 2012 ssl.sh: #703: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:30 EDT 2012 ssl.sh: #704: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:30 EDT 2012 ssl.sh: #705: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:30 EDT 2012 ssl.sh: #706: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:30 EDT 2012 ssl.sh: #707: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:31 EDT 2012 ssl.sh: #708: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:31 EDT 2012 ssl.sh: #709: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:31 EDT 2012 ssl.sh: #710: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:31 EDT 2012 ssl.sh: #711: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:31 EDT 2012 ssl.sh: #712: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:31 EDT 2012 ssl.sh: #713: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:31 EDT 2012 ssl.sh: #714: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:31 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #715: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:31 EDT 2012 ssl.sh: #716: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:31 EDT 2012 ssl.sh: #717: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:31 EDT 2012 ssl.sh: #718: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:31 EDT 2012 ssl.sh: #719: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:31 EDT 2012 ssl.sh: #720: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:32 EDT 2012 ssl.sh: #721: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:32 EDT 2012 ssl.sh: #722: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:32 EDT 2012 ssl.sh: #723: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:32 EDT 2012 ssl.sh: #724: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:32 EDT 2012 ssl.sh: #725: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:32 EDT 2012 ssl.sh: #726: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:32 EDT 2012 ssl.sh: #727: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:32 EDT 2012 ssl.sh: #728: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:32 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #729: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:32 EDT 2012 ssl.sh: #730: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:32 EDT 2012 ssl.sh: #731: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:32 EDT 2012 ssl.sh: #732: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:33 EDT 2012 ssl.sh: #733: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:33 EDT 2012 ssl.sh: #734: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:33 EDT 2012 ssl.sh: #735: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:33 EDT 2012 ssl.sh: #736: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:33 EDT 2012 ssl.sh: #737: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:33 EDT 2012 ssl.sh: #738: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:33 EDT 2012 ssl.sh: #739: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:33 EDT 2012 ssl.sh: #740: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:33 EDT 2012 ssl.sh: #741: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21936 >/dev/null 2>/dev/null selfserv_9280 with PID 21936 found at Mon Mar 26 17:36:33 EDT 2012 ssl.sh: #742: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 21936 at Mon Mar 26 17:36:33 EDT 2012 kill -USR1 21936 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 21936 killed at Mon Mar 26 17:36:33 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:33 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:33 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:33 EDT 2012 selfserv_9280 with PID 23357 started at Mon Mar 26 17:36:33 EDT 2012 Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:33 EDT 2012 ssl.sh: #743: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:33 EDT 2012 ssl.sh: #744: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:34 EDT 2012 ssl.sh: #745: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:34 EDT 2012 ssl.sh: #746: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:34 EDT 2012 ssl.sh: #747: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:34 EDT 2012 ssl.sh: #748: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:34 EDT 2012 ssl.sh: #749: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:34 EDT 2012 ssl.sh: #750: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:34 EDT 2012 ssl.sh: #751: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:34 EDT 2012 ssl.sh: #752: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:34 EDT 2012 ssl.sh: #753: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:34 EDT 2012 ssl.sh: #754: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:34 EDT 2012 ssl.sh: #755: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:34 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #756: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:35 EDT 2012 ssl.sh: #757: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:35 EDT 2012 ssl.sh: #758: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:35 EDT 2012 ssl.sh: #759: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:35 EDT 2012 ssl.sh: #760: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:35 EDT 2012 ssl.sh: #761: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:35 EDT 2012 ssl.sh: #762: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:35 EDT 2012 ssl.sh: #763: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:35 EDT 2012 ssl.sh: #764: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:35 EDT 2012 ssl.sh: #765: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:35 EDT 2012 ssl.sh: #766: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:35 EDT 2012 ssl.sh: #767: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:35 EDT 2012 ssl.sh: #768: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:35 EDT 2012 ssl.sh: #769: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:36 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #770: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:36 EDT 2012 ssl.sh: #771: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:36 EDT 2012 ssl.sh: #772: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:36 EDT 2012 ssl.sh: #773: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:36 EDT 2012 ssl.sh: #774: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:36 EDT 2012 ssl.sh: #775: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:36 EDT 2012 ssl.sh: #776: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:36 EDT 2012 ssl.sh: #777: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:36 EDT 2012 ssl.sh: #778: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:36 EDT 2012 ssl.sh: #779: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:36 EDT 2012 ssl.sh: #780: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:36 EDT 2012 ssl.sh: #781: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:36 EDT 2012 ssl.sh: #782: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23357 >/dev/null 2>/dev/null selfserv_9280 with PID 23357 found at Mon Mar 26 17:36:37 EDT 2012 ssl.sh: #783: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 23357 at Mon Mar 26 17:36:37 EDT 2012 kill -USR1 23357 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23357 killed at Mon Mar 26 17:36:37 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:37 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24777 >/dev/null 2>/dev/null selfserv_9280 with PID 24777 found at Mon Mar 26 17:36:37 EDT 2012 selfserv_9280 with PID 24777 started at Mon Mar 26 17:36:37 EDT 2012 ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9280 with PID 24777 at Mon Mar 26 17:36:37 EDT 2012 kill -USR1 24777 ./ssl.sh: line 207: 24777 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9280 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24777 killed at Mon Mar 26 17:36:37 EDT 2012 ssl.sh: SSL Cipher Coverage - server bypass/client normal =============================== selfserv_9280 starting at Mon Mar 26 17:36:37 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:37 EDT 2012 selfserv_9280 with PID 24825 started at Mon Mar 26 17:36:37 EDT 2012 ssl.sh: running SSL2_RC4_128_WITH_MD5 ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c A -T -O \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #784: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c B -O \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #785: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c C -O \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #786: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c D -T -O \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #787: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c E -O \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #788: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c F -T -O \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #789: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #790: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #791: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #792: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c f -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #793: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c g -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #794: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #795: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #796: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #797: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c l -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #798: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c m -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #799: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #800: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #801: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #802: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #803: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #804: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #805: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #806: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c f -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #807: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c g -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #808: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #809: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #810: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #811: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c l -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #812: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c m -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #813: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #814: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #815: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #816: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 24825 >/dev/null 2>/dev/null selfserv_9280 with PID 24825 found at Mon Mar 26 17:36:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9280 with PID 24825 at Mon Mar 26 17:36:39 EDT 2012 kill -USR1 24825 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24825 killed at Mon Mar 26 17:36:39 EDT 2012 ssl.sh: SSL Client Authentication - server bypass/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:40 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26407 >/dev/null 2>/dev/null selfserv_9280 with PID 26407 found at Mon Mar 26 17:36:40 EDT 2012 selfserv_9280 with PID 26407 started at Mon Mar 26 17:36:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 26407 at Mon Mar 26 17:36:40 EDT 2012 kill -USR1 26407 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26407 killed at Mon Mar 26 17:36:40 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:40 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26464 >/dev/null 2>/dev/null selfserv_9280 with PID 26464 found at Mon Mar 26 17:36:40 EDT 2012 selfserv_9280 with PID 26464 started at Mon Mar 26 17:36:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 26464 at Mon Mar 26 17:36:40 EDT 2012 kill -USR1 26464 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26464 killed at Mon Mar 26 17:36:40 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:40 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26521 >/dev/null 2>/dev/null selfserv_9280 with PID 26521 found at Mon Mar 26 17:36:40 EDT 2012 selfserv_9280 with PID 26521 started at Mon Mar 26 17:36:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 26521 at Mon Mar 26 17:36:40 EDT 2012 kill -USR1 26521 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26521 killed at Mon Mar 26 17:36:40 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:40 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26578 >/dev/null 2>/dev/null selfserv_9280 with PID 26578 found at Mon Mar 26 17:36:40 EDT 2012 selfserv_9280 with PID 26578 started at Mon Mar 26 17:36:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #821: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 26578 at Mon Mar 26 17:36:40 EDT 2012 kill -USR1 26578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26578 killed at Mon Mar 26 17:36:40 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:40 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26635 >/dev/null 2>/dev/null selfserv_9280 with PID 26635 found at Mon Mar 26 17:36:40 EDT 2012 selfserv_9280 with PID 26635 started at Mon Mar 26 17:36:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #822: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 26635 at Mon Mar 26 17:36:40 EDT 2012 kill -USR1 26635 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26635 killed at Mon Mar 26 17:36:40 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:40 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26692 >/dev/null 2>/dev/null selfserv_9280 with PID 26692 found at Mon Mar 26 17:36:40 EDT 2012 selfserv_9280 with PID 26692 started at Mon Mar 26 17:36:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 26692 at Mon Mar 26 17:36:41 EDT 2012 kill -USR1 26692 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26692 killed at Mon Mar 26 17:36:41 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:41 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26749 >/dev/null 2>/dev/null selfserv_9280 with PID 26749 found at Mon Mar 26 17:36:41 EDT 2012 selfserv_9280 with PID 26749 started at Mon Mar 26 17:36:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 26749 at Mon Mar 26 17:36:41 EDT 2012 kill -USR1 26749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26749 killed at Mon Mar 26 17:36:41 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:41 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26806 >/dev/null 2>/dev/null selfserv_9280 with PID 26806 found at Mon Mar 26 17:36:41 EDT 2012 selfserv_9280 with PID 26806 started at Mon Mar 26 17:36:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 26806 at Mon Mar 26 17:36:41 EDT 2012 kill -USR1 26806 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26806 killed at Mon Mar 26 17:36:41 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:41 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26863 >/dev/null 2>/dev/null selfserv_9280 with PID 26863 found at Mon Mar 26 17:36:41 EDT 2012 selfserv_9280 with PID 26863 started at Mon Mar 26 17:36:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 26863 at Mon Mar 26 17:36:41 EDT 2012 kill -USR1 26863 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26863 killed at Mon Mar 26 17:36:41 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:41 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26920 >/dev/null 2>/dev/null selfserv_9280 with PID 26920 found at Mon Mar 26 17:36:41 EDT 2012 selfserv_9280 with PID 26920 started at Mon Mar 26 17:36:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #827: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 26920 at Mon Mar 26 17:36:41 EDT 2012 kill -USR1 26920 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26920 killed at Mon Mar 26 17:36:41 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:41 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26977 >/dev/null 2>/dev/null selfserv_9280 with PID 26977 found at Mon Mar 26 17:36:41 EDT 2012 selfserv_9280 with PID 26977 started at Mon Mar 26 17:36:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #828: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 26977 at Mon Mar 26 17:36:42 EDT 2012 kill -USR1 26977 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26977 killed at Mon Mar 26 17:36:42 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:42 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27034 >/dev/null 2>/dev/null selfserv_9280 with PID 27034 found at Mon Mar 26 17:36:42 EDT 2012 selfserv_9280 with PID 27034 started at Mon Mar 26 17:36:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27034 at Mon Mar 26 17:36:42 EDT 2012 kill -USR1 27034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27034 killed at Mon Mar 26 17:36:42 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:42 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27091 >/dev/null 2>/dev/null selfserv_9280 with PID 27091 found at Mon Mar 26 17:36:42 EDT 2012 selfserv_9280 with PID 27091 started at Mon Mar 26 17:36:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27091 at Mon Mar 26 17:36:42 EDT 2012 kill -USR1 27091 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27091 killed at Mon Mar 26 17:36:42 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:42 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27148 >/dev/null 2>/dev/null selfserv_9280 with PID 27148 found at Mon Mar 26 17:36:42 EDT 2012 selfserv_9280 with PID 27148 started at Mon Mar 26 17:36:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27148 at Mon Mar 26 17:36:42 EDT 2012 kill -USR1 27148 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27148 killed at Mon Mar 26 17:36:42 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:42 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27205 >/dev/null 2>/dev/null selfserv_9280 with PID 27205 found at Mon Mar 26 17:36:42 EDT 2012 selfserv_9280 with PID 27205 started at Mon Mar 26 17:36:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27205 at Mon Mar 26 17:36:42 EDT 2012 kill -USR1 27205 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27205 killed at Mon Mar 26 17:36:42 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:43 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27262 >/dev/null 2>/dev/null selfserv_9280 with PID 27262 found at Mon Mar 26 17:36:43 EDT 2012 selfserv_9280 with PID 27262 started at Mon Mar 26 17:36:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #833: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27262 at Mon Mar 26 17:36:43 EDT 2012 kill -USR1 27262 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27262 killed at Mon Mar 26 17:36:43 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:43 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27319 >/dev/null 2>/dev/null selfserv_9280 with PID 27319 found at Mon Mar 26 17:36:43 EDT 2012 selfserv_9280 with PID 27319 started at Mon Mar 26 17:36:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #834: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27319 at Mon Mar 26 17:36:43 EDT 2012 kill -USR1 27319 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27319 killed at Mon Mar 26 17:36:43 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:43 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27376 >/dev/null 2>/dev/null selfserv_9280 with PID 27376 found at Mon Mar 26 17:36:43 EDT 2012 selfserv_9280 with PID 27376 started at Mon Mar 26 17:36:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27376 at Mon Mar 26 17:36:43 EDT 2012 kill -USR1 27376 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27376 killed at Mon Mar 26 17:36:43 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:43 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27433 >/dev/null 2>/dev/null selfserv_9280 with PID 27433 found at Mon Mar 26 17:36:43 EDT 2012 selfserv_9280 with PID 27433 started at Mon Mar 26 17:36:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27433 at Mon Mar 26 17:36:43 EDT 2012 kill -USR1 27433 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27433 killed at Mon Mar 26 17:36:43 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:43 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27490 >/dev/null 2>/dev/null selfserv_9280 with PID 27490 found at Mon Mar 26 17:36:43 EDT 2012 selfserv_9280 with PID 27490 started at Mon Mar 26 17:36:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27490 at Mon Mar 26 17:36:43 EDT 2012 kill -USR1 27490 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27490 killed at Mon Mar 26 17:36:43 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:43 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27547 >/dev/null 2>/dev/null selfserv_9280 with PID 27547 found at Mon Mar 26 17:36:43 EDT 2012 selfserv_9280 with PID 27547 started at Mon Mar 26 17:36:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27547 at Mon Mar 26 17:36:44 EDT 2012 kill -USR1 27547 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27547 killed at Mon Mar 26 17:36:44 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:44 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27604 >/dev/null 2>/dev/null selfserv_9280 with PID 27604 found at Mon Mar 26 17:36:44 EDT 2012 selfserv_9280 with PID 27604 started at Mon Mar 26 17:36:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #839: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27604 at Mon Mar 26 17:36:44 EDT 2012 kill -USR1 27604 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27604 killed at Mon Mar 26 17:36:44 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:36:44 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27661 >/dev/null 2>/dev/null selfserv_9280 with PID 27661 found at Mon Mar 26 17:36:44 EDT 2012 selfserv_9280 with PID 27661 started at Mon Mar 26 17:36:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #840: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27661 at Mon Mar 26 17:36:44 EDT 2012 kill -USR1 27661 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27661 killed at Mon Mar 26 17:36:44 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:44 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27718 >/dev/null 2>/dev/null selfserv_9280 with PID 27718 found at Mon Mar 26 17:36:44 EDT 2012 selfserv_9280 with PID 27718 started at Mon Mar 26 17:36:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27718 at Mon Mar 26 17:36:44 EDT 2012 kill -USR1 27718 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27718 killed at Mon Mar 26 17:36:44 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: TLS Server hello response without SNI ---- selfserv_9280 starting at Mon Mar 26 17:36:44 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27843 >/dev/null 2>/dev/null selfserv_9280 with PID 27843 found at Mon Mar 26 17:36:44 EDT 2012 selfserv_9280 with PID 27843 started at Mon Mar 26 17:36:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27843 at Mon Mar 26 17:36:45 EDT 2012 kill -USR1 27843 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27843 killed at Mon Mar 26 17:36:45 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9280 starting at Mon Mar 26 17:36:45 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27906 >/dev/null 2>/dev/null selfserv_9280 with PID 27906 found at Mon Mar 26 17:36:45 EDT 2012 selfserv_9280 with PID 27906 started at Mon Mar 26 17:36:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27906 at Mon Mar 26 17:36:45 EDT 2012 kill -USR1 27906 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27906 killed at Mon Mar 26 17:36:45 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9280 starting at Mon Mar 26 17:36:45 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27969 >/dev/null 2>/dev/null selfserv_9280 with PID 27969 found at Mon Mar 26 17:36:45 EDT 2012 selfserv_9280 with PID 27969 started at Mon Mar 26 17:36:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #844: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27969 at Mon Mar 26 17:36:45 EDT 2012 kill -USR1 27969 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27969 killed at Mon Mar 26 17:36:45 EDT 2012 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9280 starting at Mon Mar 26 17:36:45 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28032 >/dev/null 2>/dev/null selfserv_9280 with PID 28032 found at Mon Mar 26 17:36:45 EDT 2012 selfserv_9280 with PID 28032 started at Mon Mar 26 17:36:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 28032 at Mon Mar 26 17:36:45 EDT 2012 kill -USR1 28032 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28032 killed at Mon Mar 26 17:36:45 EDT 2012 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9280 starting at Mon Mar 26 17:36:45 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28095 >/dev/null 2>/dev/null selfserv_9280 with PID 28095 found at Mon Mar 26 17:36:45 EDT 2012 selfserv_9280 with PID 28095 started at Mon Mar 26 17:36:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #846: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 28095 at Mon Mar 26 17:36:45 EDT 2012 kill -USR1 28095 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28095 killed at Mon Mar 26 17:36:45 EDT 2012 ssl.sh: TLS Server hello response without SNI ---- selfserv_9280 starting at Mon Mar 26 17:36:45 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28158 >/dev/null 2>/dev/null selfserv_9280 with PID 28158 found at Mon Mar 26 17:36:45 EDT 2012 selfserv_9280 with PID 28158 started at Mon Mar 26 17:36:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 28158 at Mon Mar 26 17:36:45 EDT 2012 kill -USR1 28158 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28158 killed at Mon Mar 26 17:36:46 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9280 starting at Mon Mar 26 17:36:46 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:46 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28221 >/dev/null 2>/dev/null selfserv_9280 with PID 28221 found at Mon Mar 26 17:36:46 EDT 2012 selfserv_9280 with PID 28221 started at Mon Mar 26 17:36:46 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 28221 at Mon Mar 26 17:36:46 EDT 2012 kill -USR1 28221 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28221 killed at Mon Mar 26 17:36:46 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9280 starting at Mon Mar 26 17:36:46 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:46 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28284 >/dev/null 2>/dev/null selfserv_9280 with PID 28284 found at Mon Mar 26 17:36:46 EDT 2012 selfserv_9280 with PID 28284 started at Mon Mar 26 17:36:46 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #849: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 28284 at Mon Mar 26 17:36:46 EDT 2012 kill -USR1 28284 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28284 killed at Mon Mar 26 17:36:46 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9280 starting at Mon Mar 26 17:36:46 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:46 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28347 >/dev/null 2>/dev/null selfserv_9280 with PID 28347 found at Mon Mar 26 17:36:46 EDT 2012 selfserv_9280 with PID 28347 started at Mon Mar 26 17:36:46 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #850: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 28347 at Mon Mar 26 17:36:46 EDT 2012 kill -USR1 28347 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28347 killed at Mon Mar 26 17:36:46 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9280 starting at Mon Mar 26 17:36:46 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:46 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28410 >/dev/null 2>/dev/null selfserv_9280 with PID 28410 found at Mon Mar 26 17:36:46 EDT 2012 selfserv_9280 with PID 28410 started at Mon Mar 26 17:36:46 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #851: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 28410 at Mon Mar 26 17:36:46 EDT 2012 kill -USR1 28410 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28410 killed at Mon Mar 26 17:36:46 EDT 2012 ssl.sh: SSL Stress Test - server bypass/client normal =============================== ssl.sh: Stress SSL2 RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:36:47 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:47 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28759 >/dev/null 2>/dev/null selfserv_9280 with PID 28759 found at Mon Mar 26 17:36:47 EDT 2012 selfserv_9280 with PID 28759 started at Mon Mar 26 17:36:47 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -c 1000 -C A \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:47 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: SSL2 - 1 server certificates tested. strsclnt completed at Mon Mar 26 17:36:47 EDT 2012 ssl.sh: #852: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 28759 at Mon Mar 26 17:36:47 EDT 2012 kill -USR1 28759 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28759 killed at Mon Mar 26 17:36:47 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:36:47 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:47 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28835 >/dev/null 2>/dev/null selfserv_9280 with PID 28835 found at Mon Mar 26 17:36:47 EDT 2012 selfserv_9280 with PID 28835 started at Mon Mar 26 17:36:47 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:47 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:36:48 EDT 2012 ssl.sh: #853: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 28835 at Mon Mar 26 17:36:48 EDT 2012 kill -USR1 28835 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28835 killed at Mon Mar 26 17:36:48 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:36:48 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:48 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28911 >/dev/null 2>/dev/null selfserv_9280 with PID 28911 found at Mon Mar 26 17:36:48 EDT 2012 selfserv_9280 with PID 28911 started at Mon Mar 26 17:36:48 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:48 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:36:48 EDT 2012 ssl.sh: #854: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 28911 at Mon Mar 26 17:36:48 EDT 2012 kill -USR1 28911 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28911 killed at Mon Mar 26 17:36:48 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9280 starting at Mon Mar 26 17:36:48 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:48 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28987 >/dev/null 2>/dev/null selfserv_9280 with PID 28987 found at Mon Mar 26 17:36:48 EDT 2012 selfserv_9280 with PID 28987 started at Mon Mar 26 17:36:48 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:48 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:36:49 EDT 2012 ssl.sh: #855: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 28987 at Mon Mar 26 17:36:49 EDT 2012 kill -USR1 28987 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28987 killed at Mon Mar 26 17:36:49 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9280 starting at Mon Mar 26 17:36:49 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:49 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29063 >/dev/null 2>/dev/null selfserv_9280 with PID 29063 found at Mon Mar 26 17:36:49 EDT 2012 selfserv_9280 with PID 29063 started at Mon Mar 26 17:36:49 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:49 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:36:50 EDT 2012 ssl.sh: #856: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29063 at Mon Mar 26 17:36:50 EDT 2012 kill -USR1 29063 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29063 killed at Mon Mar 26 17:36:50 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9280 starting at Mon Mar 26 17:36:50 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:50 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29139 >/dev/null 2>/dev/null selfserv_9280 with PID 29139 found at Mon Mar 26 17:36:50 EDT 2012 selfserv_9280 with PID 29139 started at Mon Mar 26 17:36:50 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:50 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:36:50 EDT 2012 ssl.sh: #857: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29139 at Mon Mar 26 17:36:51 EDT 2012 kill -USR1 29139 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29139 killed at Mon Mar 26 17:36:51 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9280 starting at Mon Mar 26 17:36:51 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:51 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29215 >/dev/null 2>/dev/null selfserv_9280 with PID 29215 found at Mon Mar 26 17:36:51 EDT 2012 selfserv_9280 with PID 29215 started at Mon Mar 26 17:36:51 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:51 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:36:51 EDT 2012 ssl.sh: #858: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29215 at Mon Mar 26 17:36:51 EDT 2012 kill -USR1 29215 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29215 killed at Mon Mar 26 17:36:51 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9280 starting at Mon Mar 26 17:36:51 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:51 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29291 >/dev/null 2>/dev/null selfserv_9280 with PID 29291 found at Mon Mar 26 17:36:51 EDT 2012 selfserv_9280 with PID 29291 started at Mon Mar 26 17:36:51 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:51 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:36:52 EDT 2012 ssl.sh: #859: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29291 at Mon Mar 26 17:36:52 EDT 2012 kill -USR1 29291 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29291 killed at Mon Mar 26 17:36:52 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9280 starting at Mon Mar 26 17:36:52 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:52 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29373 >/dev/null 2>/dev/null selfserv_9280 with PID 29373 found at Mon Mar 26 17:36:52 EDT 2012 selfserv_9280 with PID 29373 started at Mon Mar 26 17:36:52 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:52 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:36:53 EDT 2012 ssl.sh: #860: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29373 at Mon Mar 26 17:36:53 EDT 2012 kill -USR1 29373 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29373 killed at Mon Mar 26 17:36:53 EDT 2012 ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:53 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:53 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29470 >/dev/null 2>/dev/null selfserv_9280 with PID 29470 found at Mon Mar 26 17:36:53 EDT 2012 selfserv_9280 with PID 29470 started at Mon Mar 26 17:36:53 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -c 100 -C A -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:53 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: SSL2 - 100 server certificates tested. strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:36:54 EDT 2012 ssl.sh: #861: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29470 at Mon Mar 26 17:36:54 EDT 2012 kill -USR1 29470 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29470 killed at Mon Mar 26 17:36:54 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:54 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:54 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29545 >/dev/null 2>/dev/null selfserv_9280 with PID 29545 found at Mon Mar 26 17:36:54 EDT 2012 selfserv_9280 with PID 29545 started at Mon Mar 26 17:36:54 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:54 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:36:54 EDT 2012 ssl.sh: #862: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29545 at Mon Mar 26 17:36:54 EDT 2012 kill -USR1 29545 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29545 killed at Mon Mar 26 17:36:55 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:55 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:55 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29620 >/dev/null 2>/dev/null selfserv_9280 with PID 29620 found at Mon Mar 26 17:36:55 EDT 2012 selfserv_9280 with PID 29620 started at Mon Mar 26 17:36:55 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:55 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:36:55 EDT 2012 ssl.sh: #863: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29620 at Mon Mar 26 17:36:55 EDT 2012 kill -USR1 29620 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29620 killed at Mon Mar 26 17:36:55 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:55 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:55 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29695 >/dev/null 2>/dev/null selfserv_9280 with PID 29695 found at Mon Mar 26 17:36:55 EDT 2012 selfserv_9280 with PID 29695 started at Mon Mar 26 17:36:55 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:55 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:36:55 EDT 2012 ssl.sh: #864: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29695 at Mon Mar 26 17:36:55 EDT 2012 kill -USR1 29695 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29695 killed at Mon Mar 26 17:36:55 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:55 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:55 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29771 >/dev/null 2>/dev/null selfserv_9280 with PID 29771 found at Mon Mar 26 17:36:56 EDT 2012 selfserv_9280 with PID 29771 started at Mon Mar 26 17:36:56 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:56 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:36:56 EDT 2012 ssl.sh: #865: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29771 at Mon Mar 26 17:36:56 EDT 2012 kill -USR1 29771 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29771 killed at Mon Mar 26 17:36:56 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:36:56 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29847 >/dev/null 2>/dev/null selfserv_9280 with PID 29847 found at Mon Mar 26 17:36:56 EDT 2012 selfserv_9280 with PID 29847 started at Mon Mar 26 17:36:56 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:56 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:36:56 EDT 2012 ssl.sh: #866: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29847 at Mon Mar 26 17:36:56 EDT 2012 kill -USR1 29847 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29847 killed at Mon Mar 26 17:36:56 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:36:56 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29923 >/dev/null 2>/dev/null selfserv_9280 with PID 29923 found at Mon Mar 26 17:36:56 EDT 2012 selfserv_9280 with PID 29923 started at Mon Mar 26 17:36:56 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:56 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:36:56 EDT 2012 ssl.sh: #867: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29923 at Mon Mar 26 17:36:56 EDT 2012 kill -USR1 29923 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29923 killed at Mon Mar 26 17:36:56 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:36:56 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29999 >/dev/null 2>/dev/null selfserv_9280 with PID 29999 found at Mon Mar 26 17:36:56 EDT 2012 selfserv_9280 with PID 29999 started at Mon Mar 26 17:36:56 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:56 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:36:57 EDT 2012 ssl.sh: #868: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29999 at Mon Mar 26 17:36:57 EDT 2012 kill -USR1 29999 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29999 killed at Mon Mar 26 17:36:57 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9280 starting at Mon Mar 26 17:36:57 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 30081 >/dev/null 2>/dev/null selfserv_9280 with PID 30081 found at Mon Mar 26 17:36:57 EDT 2012 selfserv_9280 with PID 30081 started at Mon Mar 26 17:36:57 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:57 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:36:57 EDT 2012 ssl.sh: #869: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 30081 at Mon Mar 26 17:36:57 EDT 2012 kill -USR1 30081 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 30081 killed at Mon Mar 26 17:36:57 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9280 starting at Mon Mar 26 17:36:57 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 30163 >/dev/null 2>/dev/null selfserv_9280 with PID 30163 found at Mon Mar 26 17:36:57 EDT 2012 selfserv_9280 with PID 30163 started at Mon Mar 26 17:36:57 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Mar 26 17:36:57 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:36:58 EDT 2012 ssl.sh: #870: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 30163 at Mon Mar 26 17:36:58 EDT 2012 kill -USR1 30163 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 30163 killed at Mon Mar 26 17:36:58 EDT 2012 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client normal =============================== selfserv_9280 starting at Mon Mar 26 17:36:58 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:36:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:36:58 EDT 2012 selfserv_9280 with PID 30318 started at Mon Mar 26 17:36:58 EDT 2012 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:36:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:36:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:36:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:36:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c f -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:36:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c g -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:36:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:36:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:36:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:36:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c l -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:36:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c m -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:36:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:36:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:36:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:36:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:36:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:36:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:37:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:37:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c f -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:37:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c g -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:37:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:37:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:37:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:37:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c l -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:37:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c m -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:37:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:37:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:37:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 30318 >/dev/null 2>/dev/null selfserv_9280 with PID 30318 found at Mon Mar 26 17:37:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9280 with PID 30318 at Mon Mar 26 17:37:00 EDT 2012 kill -USR1 30318 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 30318 killed at Mon Mar 26 17:37:00 EDT 2012 ssl.sh: SSL Client Authentication Extended Test - server bypass/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:01 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31788 >/dev/null 2>/dev/null selfserv_9280 with PID 31788 found at Mon Mar 26 17:37:01 EDT 2012 selfserv_9280 with PID 31788 started at Mon Mar 26 17:37:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 31788 at Mon Mar 26 17:37:01 EDT 2012 kill -USR1 31788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31788 killed at Mon Mar 26 17:37:01 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:01 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31845 >/dev/null 2>/dev/null selfserv_9280 with PID 31845 found at Mon Mar 26 17:37:01 EDT 2012 selfserv_9280 with PID 31845 started at Mon Mar 26 17:37:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 31845 at Mon Mar 26 17:37:01 EDT 2012 kill -USR1 31845 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31845 killed at Mon Mar 26 17:37:01 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:01 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31902 >/dev/null 2>/dev/null selfserv_9280 with PID 31902 found at Mon Mar 26 17:37:01 EDT 2012 selfserv_9280 with PID 31902 started at Mon Mar 26 17:37:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 31902 at Mon Mar 26 17:37:01 EDT 2012 kill -USR1 31902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31902 killed at Mon Mar 26 17:37:01 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:01 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31959 >/dev/null 2>/dev/null selfserv_9280 with PID 31959 found at Mon Mar 26 17:37:01 EDT 2012 selfserv_9280 with PID 31959 started at Mon Mar 26 17:37:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #902: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 31959 at Mon Mar 26 17:37:02 EDT 2012 kill -USR1 31959 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31959 killed at Mon Mar 26 17:37:02 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32016 >/dev/null 2>/dev/null selfserv_9280 with PID 32016 found at Mon Mar 26 17:37:02 EDT 2012 selfserv_9280 with PID 32016 started at Mon Mar 26 17:37:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #903: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 32016 at Mon Mar 26 17:37:02 EDT 2012 kill -USR1 32016 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32016 killed at Mon Mar 26 17:37:02 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32073 >/dev/null 2>/dev/null selfserv_9280 with PID 32073 found at Mon Mar 26 17:37:02 EDT 2012 selfserv_9280 with PID 32073 started at Mon Mar 26 17:37:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 32073 at Mon Mar 26 17:37:02 EDT 2012 kill -USR1 32073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32073 killed at Mon Mar 26 17:37:02 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32130 >/dev/null 2>/dev/null selfserv_9280 with PID 32130 found at Mon Mar 26 17:37:02 EDT 2012 selfserv_9280 with PID 32130 started at Mon Mar 26 17:37:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 32130 at Mon Mar 26 17:37:02 EDT 2012 kill -USR1 32130 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32130 killed at Mon Mar 26 17:37:02 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32187 >/dev/null 2>/dev/null selfserv_9280 with PID 32187 found at Mon Mar 26 17:37:02 EDT 2012 selfserv_9280 with PID 32187 started at Mon Mar 26 17:37:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 32187 at Mon Mar 26 17:37:02 EDT 2012 kill -USR1 32187 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32187 killed at Mon Mar 26 17:37:02 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32244 >/dev/null 2>/dev/null selfserv_9280 with PID 32244 found at Mon Mar 26 17:37:02 EDT 2012 selfserv_9280 with PID 32244 started at Mon Mar 26 17:37:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 32244 at Mon Mar 26 17:37:02 EDT 2012 kill -USR1 32244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32244 killed at Mon Mar 26 17:37:02 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32301 >/dev/null 2>/dev/null selfserv_9280 with PID 32301 found at Mon Mar 26 17:37:03 EDT 2012 selfserv_9280 with PID 32301 started at Mon Mar 26 17:37:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #908: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 32301 at Mon Mar 26 17:37:03 EDT 2012 kill -USR1 32301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32301 killed at Mon Mar 26 17:37:03 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32358 >/dev/null 2>/dev/null selfserv_9280 with PID 32358 found at Mon Mar 26 17:37:03 EDT 2012 selfserv_9280 with PID 32358 started at Mon Mar 26 17:37:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #909: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 32358 at Mon Mar 26 17:37:03 EDT 2012 kill -USR1 32358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32358 killed at Mon Mar 26 17:37:03 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32415 >/dev/null 2>/dev/null selfserv_9280 with PID 32415 found at Mon Mar 26 17:37:03 EDT 2012 selfserv_9280 with PID 32415 started at Mon Mar 26 17:37:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 32415 at Mon Mar 26 17:37:03 EDT 2012 kill -USR1 32415 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32415 killed at Mon Mar 26 17:37:03 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32472 >/dev/null 2>/dev/null selfserv_9280 with PID 32472 found at Mon Mar 26 17:37:03 EDT 2012 selfserv_9280 with PID 32472 started at Mon Mar 26 17:37:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 32472 at Mon Mar 26 17:37:03 EDT 2012 kill -USR1 32472 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32472 killed at Mon Mar 26 17:37:03 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32529 >/dev/null 2>/dev/null selfserv_9280 with PID 32529 found at Mon Mar 26 17:37:03 EDT 2012 selfserv_9280 with PID 32529 started at Mon Mar 26 17:37:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 32529 at Mon Mar 26 17:37:03 EDT 2012 kill -USR1 32529 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32529 killed at Mon Mar 26 17:37:03 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32586 >/dev/null 2>/dev/null selfserv_9280 with PID 32586 found at Mon Mar 26 17:37:04 EDT 2012 selfserv_9280 with PID 32586 started at Mon Mar 26 17:37:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 32586 at Mon Mar 26 17:37:04 EDT 2012 kill -USR1 32586 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32586 killed at Mon Mar 26 17:37:04 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32643 >/dev/null 2>/dev/null selfserv_9280 with PID 32643 found at Mon Mar 26 17:37:04 EDT 2012 selfserv_9280 with PID 32643 started at Mon Mar 26 17:37:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #914: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 32643 at Mon Mar 26 17:37:04 EDT 2012 kill -USR1 32643 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32643 killed at Mon Mar 26 17:37:04 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32700 >/dev/null 2>/dev/null selfserv_9280 with PID 32700 found at Mon Mar 26 17:37:04 EDT 2012 selfserv_9280 with PID 32700 started at Mon Mar 26 17:37:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #915: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 32700 at Mon Mar 26 17:37:04 EDT 2012 kill -USR1 32700 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32700 killed at Mon Mar 26 17:37:04 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32757 >/dev/null 2>/dev/null selfserv_9280 with PID 32757 found at Mon Mar 26 17:37:04 EDT 2012 selfserv_9280 with PID 32757 started at Mon Mar 26 17:37:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 32757 at Mon Mar 26 17:37:04 EDT 2012 kill -USR1 32757 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32757 killed at Mon Mar 26 17:37:04 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 348 >/dev/null 2>/dev/null selfserv_9280 with PID 348 found at Mon Mar 26 17:37:04 EDT 2012 selfserv_9280 with PID 348 started at Mon Mar 26 17:37:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 348 at Mon Mar 26 17:37:04 EDT 2012 kill -USR1 348 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 348 killed at Mon Mar 26 17:37:04 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 405 >/dev/null 2>/dev/null selfserv_9280 with PID 405 found at Mon Mar 26 17:37:04 EDT 2012 selfserv_9280 with PID 405 started at Mon Mar 26 17:37:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 405 at Mon Mar 26 17:37:05 EDT 2012 kill -USR1 405 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 405 killed at Mon Mar 26 17:37:05 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 463 >/dev/null 2>/dev/null selfserv_9280 with PID 463 found at Mon Mar 26 17:37:05 EDT 2012 selfserv_9280 with PID 463 started at Mon Mar 26 17:37:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 463 at Mon Mar 26 17:37:05 EDT 2012 kill -USR1 463 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 463 killed at Mon Mar 26 17:37:05 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 520 >/dev/null 2>/dev/null selfserv_9280 with PID 520 found at Mon Mar 26 17:37:05 EDT 2012 selfserv_9280 with PID 520 started at Mon Mar 26 17:37:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #920: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 520 at Mon Mar 26 17:37:05 EDT 2012 kill -USR1 520 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 520 killed at Mon Mar 26 17:37:05 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 577 >/dev/null 2>/dev/null selfserv_9280 with PID 577 found at Mon Mar 26 17:37:05 EDT 2012 selfserv_9280 with PID 577 started at Mon Mar 26 17:37:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #921: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 577 at Mon Mar 26 17:37:05 EDT 2012 kill -USR1 577 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 577 killed at Mon Mar 26 17:37:05 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 635 >/dev/null 2>/dev/null selfserv_9280 with PID 635 found at Mon Mar 26 17:37:05 EDT 2012 selfserv_9280 with PID 635 started at Mon Mar 26 17:37:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 635 at Mon Mar 26 17:37:05 EDT 2012 kill -USR1 635 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 635 killed at Mon Mar 26 17:37:05 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client normal =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:37:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1075 >/dev/null 2>/dev/null selfserv_9280 with PID 1075 found at Mon Mar 26 17:37:06 EDT 2012 selfserv_9280 with PID 1075 started at Mon Mar 26 17:37:06 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:06 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:06 EDT 2012 ssl.sh: #923: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1075 at Mon Mar 26 17:37:06 EDT 2012 kill -USR1 1075 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1075 killed at Mon Mar 26 17:37:06 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:37:07 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1157 >/dev/null 2>/dev/null selfserv_9280 with PID 1157 found at Mon Mar 26 17:37:07 EDT 2012 selfserv_9280 with PID 1157 started at Mon Mar 26 17:37:07 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:07 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:07 EDT 2012 ssl.sh: #924: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1157 at Mon Mar 26 17:37:07 EDT 2012 kill -USR1 1157 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1157 killed at Mon Mar 26 17:37:07 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9280 starting at Mon Mar 26 17:37:07 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1238 >/dev/null 2>/dev/null selfserv_9280 with PID 1238 found at Mon Mar 26 17:37:07 EDT 2012 selfserv_9280 with PID 1238 started at Mon Mar 26 17:37:07 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:07 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:08 EDT 2012 ssl.sh: #925: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1238 at Mon Mar 26 17:37:08 EDT 2012 kill -USR1 1238 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1238 killed at Mon Mar 26 17:37:08 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9280 starting at Mon Mar 26 17:37:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1316 >/dev/null 2>/dev/null selfserv_9280 with PID 1316 found at Mon Mar 26 17:37:08 EDT 2012 selfserv_9280 with PID 1316 started at Mon Mar 26 17:37:08 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:08 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:37:08 EDT 2012 ssl.sh: #926: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1316 at Mon Mar 26 17:37:08 EDT 2012 kill -USR1 1316 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1316 killed at Mon Mar 26 17:37:08 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9280 starting at Mon Mar 26 17:37:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1403 >/dev/null 2>/dev/null selfserv_9280 with PID 1403 found at Mon Mar 26 17:37:08 EDT 2012 selfserv_9280 with PID 1403 started at Mon Mar 26 17:37:08 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:08 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:09 EDT 2012 ssl.sh: #927: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1403 at Mon Mar 26 17:37:09 EDT 2012 kill -USR1 1403 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1403 killed at Mon Mar 26 17:37:09 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9280 starting at Mon Mar 26 17:37:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1479 >/dev/null 2>/dev/null selfserv_9280 with PID 1479 found at Mon Mar 26 17:37:09 EDT 2012 selfserv_9280 with PID 1479 started at Mon Mar 26 17:37:09 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:09 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:37:10 EDT 2012 ssl.sh: #928: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1479 at Mon Mar 26 17:37:10 EDT 2012 kill -USR1 1479 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1479 killed at Mon Mar 26 17:37:10 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9280 starting at Mon Mar 26 17:37:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1555 >/dev/null 2>/dev/null selfserv_9280 with PID 1555 found at Mon Mar 26 17:37:10 EDT 2012 selfserv_9280 with PID 1555 started at Mon Mar 26 17:37:10 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:10 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:37:11 EDT 2012 ssl.sh: #929: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1555 at Mon Mar 26 17:37:11 EDT 2012 kill -USR1 1555 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1555 killed at Mon Mar 26 17:37:11 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:11 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1675 >/dev/null 2>/dev/null selfserv_9280 with PID 1675 found at Mon Mar 26 17:37:11 EDT 2012 selfserv_9280 with PID 1675 started at Mon Mar 26 17:37:11 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:11 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:37:12 EDT 2012 ssl.sh: #930: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1675 at Mon Mar 26 17:37:12 EDT 2012 kill -USR1 1675 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1675 killed at Mon Mar 26 17:37:12 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1750 >/dev/null 2>/dev/null selfserv_9280 with PID 1750 found at Mon Mar 26 17:37:12 EDT 2012 selfserv_9280 with PID 1750 started at Mon Mar 26 17:37:12 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:12 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:37:13 EDT 2012 ssl.sh: #931: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1750 at Mon Mar 26 17:37:13 EDT 2012 kill -USR1 1750 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1750 killed at Mon Mar 26 17:37:13 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:13 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1825 >/dev/null 2>/dev/null selfserv_9280 with PID 1825 found at Mon Mar 26 17:37:13 EDT 2012 selfserv_9280 with PID 1825 started at Mon Mar 26 17:37:13 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:13 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:37:13 EDT 2012 ssl.sh: #932: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1825 at Mon Mar 26 17:37:13 EDT 2012 kill -USR1 1825 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1825 killed at Mon Mar 26 17:37:13 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:13 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1901 >/dev/null 2>/dev/null selfserv_9280 with PID 1901 found at Mon Mar 26 17:37:13 EDT 2012 selfserv_9280 with PID 1901 started at Mon Mar 26 17:37:13 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:13 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:13 EDT 2012 ssl.sh: #933: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1901 at Mon Mar 26 17:37:13 EDT 2012 kill -USR1 1901 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1901 killed at Mon Mar 26 17:37:13 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:37:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1977 >/dev/null 2>/dev/null selfserv_9280 with PID 1977 found at Mon Mar 26 17:37:14 EDT 2012 selfserv_9280 with PID 1977 started at Mon Mar 26 17:37:14 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:14 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:14 EDT 2012 ssl.sh: #934: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1977 at Mon Mar 26 17:37:14 EDT 2012 kill -USR1 1977 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1977 killed at Mon Mar 26 17:37:14 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 2053 >/dev/null 2>/dev/null selfserv_9280 with PID 2053 found at Mon Mar 26 17:37:14 EDT 2012 selfserv_9280 with PID 2053 started at Mon Mar 26 17:37:14 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:14 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:37:14 EDT 2012 ssl.sh: #935: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 2053 at Mon Mar 26 17:37:14 EDT 2012 kill -USR1 2053 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 2053 killed at Mon Mar 26 17:37:14 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:37:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 2129 >/dev/null 2>/dev/null selfserv_9280 with PID 2129 found at Mon Mar 26 17:37:14 EDT 2012 selfserv_9280 with PID 2129 started at Mon Mar 26 17:37:14 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:14 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:37:14 EDT 2012 ssl.sh: #936: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 2129 at Mon Mar 26 17:37:14 EDT 2012 kill -USR1 2129 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 2129 killed at Mon Mar 26 17:37:14 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage - server normal/client bypass =============================== selfserv_9280 starting at Mon Mar 26 17:37:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:15 EDT 2012 selfserv_9280 with PID 2296 started at Mon Mar 26 17:37:15 EDT 2012 ssl.sh: running SSL2_RC4_128_WITH_MD5 ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c A -T -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c B -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #938: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c C -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #939: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c D -T -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #940: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c E -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #941: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c F -T -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #942: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #943: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #944: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #945: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c f -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #946: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c g -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #947: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #948: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #949: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #950: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c l -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #951: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c m -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #952: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #953: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #954: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #955: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #956: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #957: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #958: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #959: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c f -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #960: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c g -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #961: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #962: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #963: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #964: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c l -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #965: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c m -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #966: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #967: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #968: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 2296 >/dev/null 2>/dev/null selfserv_9280 with PID 2296 found at Mon Mar 26 17:37:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9280 with PID 2296 at Mon Mar 26 17:37:17 EDT 2012 kill -USR1 2296 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 2296 killed at Mon Mar 26 17:37:17 EDT 2012 ssl.sh: SSL Client Authentication - server normal/client bypass =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 3878 >/dev/null 2>/dev/null selfserv_9280 with PID 3878 found at Mon Mar 26 17:37:18 EDT 2012 selfserv_9280 with PID 3878 started at Mon Mar 26 17:37:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 3878 at Mon Mar 26 17:37:18 EDT 2012 kill -USR1 3878 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 3878 killed at Mon Mar 26 17:37:18 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 3935 >/dev/null 2>/dev/null selfserv_9280 with PID 3935 found at Mon Mar 26 17:37:18 EDT 2012 selfserv_9280 with PID 3935 started at Mon Mar 26 17:37:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 3935 at Mon Mar 26 17:37:18 EDT 2012 kill -USR1 3935 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 3935 killed at Mon Mar 26 17:37:18 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 3992 >/dev/null 2>/dev/null selfserv_9280 with PID 3992 found at Mon Mar 26 17:37:18 EDT 2012 selfserv_9280 with PID 3992 started at Mon Mar 26 17:37:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 3992 at Mon Mar 26 17:37:18 EDT 2012 kill -USR1 3992 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 3992 killed at Mon Mar 26 17:37:18 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4049 >/dev/null 2>/dev/null selfserv_9280 with PID 4049 found at Mon Mar 26 17:37:18 EDT 2012 selfserv_9280 with PID 4049 started at Mon Mar 26 17:37:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #974: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 4049 at Mon Mar 26 17:37:18 EDT 2012 kill -USR1 4049 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4049 killed at Mon Mar 26 17:37:18 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4106 >/dev/null 2>/dev/null selfserv_9280 with PID 4106 found at Mon Mar 26 17:37:18 EDT 2012 selfserv_9280 with PID 4106 started at Mon Mar 26 17:37:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #975: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 4106 at Mon Mar 26 17:37:18 EDT 2012 kill -USR1 4106 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4106 killed at Mon Mar 26 17:37:18 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4163 >/dev/null 2>/dev/null selfserv_9280 with PID 4163 found at Mon Mar 26 17:37:18 EDT 2012 selfserv_9280 with PID 4163 started at Mon Mar 26 17:37:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4163 at Mon Mar 26 17:37:19 EDT 2012 kill -USR1 4163 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4163 killed at Mon Mar 26 17:37:19 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:19 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4220 >/dev/null 2>/dev/null selfserv_9280 with PID 4220 found at Mon Mar 26 17:37:19 EDT 2012 selfserv_9280 with PID 4220 started at Mon Mar 26 17:37:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4220 at Mon Mar 26 17:37:19 EDT 2012 kill -USR1 4220 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4220 killed at Mon Mar 26 17:37:19 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:19 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4277 >/dev/null 2>/dev/null selfserv_9280 with PID 4277 found at Mon Mar 26 17:37:19 EDT 2012 selfserv_9280 with PID 4277 started at Mon Mar 26 17:37:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4277 at Mon Mar 26 17:37:19 EDT 2012 kill -USR1 4277 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4277 killed at Mon Mar 26 17:37:19 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:19 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4334 >/dev/null 2>/dev/null selfserv_9280 with PID 4334 found at Mon Mar 26 17:37:19 EDT 2012 selfserv_9280 with PID 4334 started at Mon Mar 26 17:37:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4334 at Mon Mar 26 17:37:19 EDT 2012 kill -USR1 4334 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4334 killed at Mon Mar 26 17:37:19 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:19 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4391 >/dev/null 2>/dev/null selfserv_9280 with PID 4391 found at Mon Mar 26 17:37:19 EDT 2012 selfserv_9280 with PID 4391 started at Mon Mar 26 17:37:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #980: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 4391 at Mon Mar 26 17:37:19 EDT 2012 kill -USR1 4391 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4391 killed at Mon Mar 26 17:37:19 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:19 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4448 >/dev/null 2>/dev/null selfserv_9280 with PID 4448 found at Mon Mar 26 17:37:19 EDT 2012 selfserv_9280 with PID 4448 started at Mon Mar 26 17:37:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #981: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 4448 at Mon Mar 26 17:37:20 EDT 2012 kill -USR1 4448 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4448 killed at Mon Mar 26 17:37:20 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:20 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4505 >/dev/null 2>/dev/null selfserv_9280 with PID 4505 found at Mon Mar 26 17:37:20 EDT 2012 selfserv_9280 with PID 4505 started at Mon Mar 26 17:37:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4505 at Mon Mar 26 17:37:20 EDT 2012 kill -USR1 4505 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4505 killed at Mon Mar 26 17:37:20 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:20 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4562 >/dev/null 2>/dev/null selfserv_9280 with PID 4562 found at Mon Mar 26 17:37:20 EDT 2012 selfserv_9280 with PID 4562 started at Mon Mar 26 17:37:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4562 at Mon Mar 26 17:37:20 EDT 2012 kill -USR1 4562 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4562 killed at Mon Mar 26 17:37:20 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:20 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4619 >/dev/null 2>/dev/null selfserv_9280 with PID 4619 found at Mon Mar 26 17:37:20 EDT 2012 selfserv_9280 with PID 4619 started at Mon Mar 26 17:37:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4619 at Mon Mar 26 17:37:20 EDT 2012 kill -USR1 4619 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4619 killed at Mon Mar 26 17:37:20 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:20 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4676 >/dev/null 2>/dev/null selfserv_9280 with PID 4676 found at Mon Mar 26 17:37:20 EDT 2012 selfserv_9280 with PID 4676 started at Mon Mar 26 17:37:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4676 at Mon Mar 26 17:37:20 EDT 2012 kill -USR1 4676 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4676 killed at Mon Mar 26 17:37:20 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:20 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4733 >/dev/null 2>/dev/null selfserv_9280 with PID 4733 found at Mon Mar 26 17:37:20 EDT 2012 selfserv_9280 with PID 4733 started at Mon Mar 26 17:37:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #986: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 4733 at Mon Mar 26 17:37:21 EDT 2012 kill -USR1 4733 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4733 killed at Mon Mar 26 17:37:21 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:21 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4790 >/dev/null 2>/dev/null selfserv_9280 with PID 4790 found at Mon Mar 26 17:37:21 EDT 2012 selfserv_9280 with PID 4790 started at Mon Mar 26 17:37:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #987: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 4790 at Mon Mar 26 17:37:21 EDT 2012 kill -USR1 4790 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4790 killed at Mon Mar 26 17:37:21 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:21 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4847 >/dev/null 2>/dev/null selfserv_9280 with PID 4847 found at Mon Mar 26 17:37:21 EDT 2012 selfserv_9280 with PID 4847 started at Mon Mar 26 17:37:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4847 at Mon Mar 26 17:37:21 EDT 2012 kill -USR1 4847 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4847 killed at Mon Mar 26 17:37:21 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:21 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4904 >/dev/null 2>/dev/null selfserv_9280 with PID 4904 found at Mon Mar 26 17:37:21 EDT 2012 selfserv_9280 with PID 4904 started at Mon Mar 26 17:37:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4904 at Mon Mar 26 17:37:21 EDT 2012 kill -USR1 4904 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4904 killed at Mon Mar 26 17:37:21 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:21 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4961 >/dev/null 2>/dev/null selfserv_9280 with PID 4961 found at Mon Mar 26 17:37:21 EDT 2012 selfserv_9280 with PID 4961 started at Mon Mar 26 17:37:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4961 at Mon Mar 26 17:37:21 EDT 2012 kill -USR1 4961 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4961 killed at Mon Mar 26 17:37:21 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:21 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5018 >/dev/null 2>/dev/null selfserv_9280 with PID 5018 found at Mon Mar 26 17:37:21 EDT 2012 selfserv_9280 with PID 5018 started at Mon Mar 26 17:37:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 5018 at Mon Mar 26 17:37:22 EDT 2012 kill -USR1 5018 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5018 killed at Mon Mar 26 17:37:22 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:22 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5087 >/dev/null 2>/dev/null selfserv_9280 with PID 5087 found at Mon Mar 26 17:37:22 EDT 2012 selfserv_9280 with PID 5087 started at Mon Mar 26 17:37:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #992: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 5087 at Mon Mar 26 17:37:22 EDT 2012 kill -USR1 5087 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5087 killed at Mon Mar 26 17:37:22 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:22 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5144 >/dev/null 2>/dev/null selfserv_9280 with PID 5144 found at Mon Mar 26 17:37:22 EDT 2012 selfserv_9280 with PID 5144 started at Mon Mar 26 17:37:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #993: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 5144 at Mon Mar 26 17:37:22 EDT 2012 kill -USR1 5144 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5144 killed at Mon Mar 26 17:37:22 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:22 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5201 >/dev/null 2>/dev/null selfserv_9280 with PID 5201 found at Mon Mar 26 17:37:22 EDT 2012 selfserv_9280 with PID 5201 started at Mon Mar 26 17:37:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 5201 at Mon Mar 26 17:37:22 EDT 2012 kill -USR1 5201 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5201 killed at Mon Mar 26 17:37:22 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: TLS Server hello response without SNI ---- selfserv_9280 starting at Mon Mar 26 17:37:22 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5326 >/dev/null 2>/dev/null selfserv_9280 with PID 5326 found at Mon Mar 26 17:37:22 EDT 2012 selfserv_9280 with PID 5326 started at Mon Mar 26 17:37:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 5326 at Mon Mar 26 17:37:22 EDT 2012 kill -USR1 5326 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5326 killed at Mon Mar 26 17:37:22 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9280 starting at Mon Mar 26 17:37:22 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5389 >/dev/null 2>/dev/null selfserv_9280 with PID 5389 found at Mon Mar 26 17:37:22 EDT 2012 selfserv_9280 with PID 5389 started at Mon Mar 26 17:37:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 5389 at Mon Mar 26 17:37:23 EDT 2012 kill -USR1 5389 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5389 killed at Mon Mar 26 17:37:23 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9280 starting at Mon Mar 26 17:37:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5452 >/dev/null 2>/dev/null selfserv_9280 with PID 5452 found at Mon Mar 26 17:37:23 EDT 2012 selfserv_9280 with PID 5452 started at Mon Mar 26 17:37:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #997: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 5452 at Mon Mar 26 17:37:23 EDT 2012 kill -USR1 5452 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5452 killed at Mon Mar 26 17:37:23 EDT 2012 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9280 starting at Mon Mar 26 17:37:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5515 >/dev/null 2>/dev/null selfserv_9280 with PID 5515 found at Mon Mar 26 17:37:23 EDT 2012 selfserv_9280 with PID 5515 started at Mon Mar 26 17:37:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 5515 at Mon Mar 26 17:37:23 EDT 2012 kill -USR1 5515 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5515 killed at Mon Mar 26 17:37:23 EDT 2012 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9280 starting at Mon Mar 26 17:37:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5578 >/dev/null 2>/dev/null selfserv_9280 with PID 5578 found at Mon Mar 26 17:37:23 EDT 2012 selfserv_9280 with PID 5578 started at Mon Mar 26 17:37:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #999: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 5578 at Mon Mar 26 17:37:23 EDT 2012 kill -USR1 5578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5578 killed at Mon Mar 26 17:37:23 EDT 2012 ssl.sh: TLS Server hello response without SNI ---- selfserv_9280 starting at Mon Mar 26 17:37:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5641 >/dev/null 2>/dev/null selfserv_9280 with PID 5641 found at Mon Mar 26 17:37:23 EDT 2012 selfserv_9280 with PID 5641 started at Mon Mar 26 17:37:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 5641 at Mon Mar 26 17:37:23 EDT 2012 kill -USR1 5641 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5641 killed at Mon Mar 26 17:37:23 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9280 starting at Mon Mar 26 17:37:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5704 >/dev/null 2>/dev/null selfserv_9280 with PID 5704 found at Mon Mar 26 17:37:24 EDT 2012 selfserv_9280 with PID 5704 started at Mon Mar 26 17:37:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 5704 at Mon Mar 26 17:37:24 EDT 2012 kill -USR1 5704 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5704 killed at Mon Mar 26 17:37:24 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9280 starting at Mon Mar 26 17:37:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5767 >/dev/null 2>/dev/null selfserv_9280 with PID 5767 found at Mon Mar 26 17:37:24 EDT 2012 selfserv_9280 with PID 5767 started at Mon Mar 26 17:37:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #1002: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 5767 at Mon Mar 26 17:37:24 EDT 2012 kill -USR1 5767 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5767 killed at Mon Mar 26 17:37:24 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9280 starting at Mon Mar 26 17:37:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5830 >/dev/null 2>/dev/null selfserv_9280 with PID 5830 found at Mon Mar 26 17:37:24 EDT 2012 selfserv_9280 with PID 5830 started at Mon Mar 26 17:37:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #1003: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 5830 at Mon Mar 26 17:37:24 EDT 2012 kill -USR1 5830 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5830 killed at Mon Mar 26 17:37:24 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9280 starting at Mon Mar 26 17:37:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5893 >/dev/null 2>/dev/null selfserv_9280 with PID 5893 found at Mon Mar 26 17:37:24 EDT 2012 selfserv_9280 with PID 5893 started at Mon Mar 26 17:37:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #1004: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 5893 at Mon Mar 26 17:37:24 EDT 2012 kill -USR1 5893 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5893 killed at Mon Mar 26 17:37:24 EDT 2012 ssl.sh: SSL Stress Test - server normal/client bypass =============================== ssl.sh: Stress SSL2 RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:37:25 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6242 >/dev/null 2>/dev/null selfserv_9280 with PID 6242 found at Mon Mar 26 17:37:25 EDT 2012 selfserv_9280 with PID 6242 started at Mon Mar 26 17:37:25 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 1000 -C A \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:25 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: SSL2 - 1 server certificates tested. strsclnt completed at Mon Mar 26 17:37:25 EDT 2012 ssl.sh: #1005: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6242 at Mon Mar 26 17:37:25 EDT 2012 kill -USR1 6242 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6242 killed at Mon Mar 26 17:37:25 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:37:25 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6318 >/dev/null 2>/dev/null selfserv_9280 with PID 6318 found at Mon Mar 26 17:37:25 EDT 2012 selfserv_9280 with PID 6318 started at Mon Mar 26 17:37:25 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:25 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:26 EDT 2012 ssl.sh: #1006: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6318 at Mon Mar 26 17:37:26 EDT 2012 kill -USR1 6318 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6318 killed at Mon Mar 26 17:37:26 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:37:26 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6394 >/dev/null 2>/dev/null selfserv_9280 with PID 6394 found at Mon Mar 26 17:37:26 EDT 2012 selfserv_9280 with PID 6394 started at Mon Mar 26 17:37:26 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:26 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:26 EDT 2012 ssl.sh: #1007: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6394 at Mon Mar 26 17:37:27 EDT 2012 kill -USR1 6394 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6394 killed at Mon Mar 26 17:37:27 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9280 starting at Mon Mar 26 17:37:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6470 >/dev/null 2>/dev/null selfserv_9280 with PID 6470 found at Mon Mar 26 17:37:27 EDT 2012 selfserv_9280 with PID 6470 started at Mon Mar 26 17:37:27 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:27 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:27 EDT 2012 ssl.sh: #1008: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6470 at Mon Mar 26 17:37:27 EDT 2012 kill -USR1 6470 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6470 killed at Mon Mar 26 17:37:27 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9280 starting at Mon Mar 26 17:37:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6546 >/dev/null 2>/dev/null selfserv_9280 with PID 6546 found at Mon Mar 26 17:37:27 EDT 2012 selfserv_9280 with PID 6546 started at Mon Mar 26 17:37:27 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:27 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:37:28 EDT 2012 ssl.sh: #1009: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6546 at Mon Mar 26 17:37:28 EDT 2012 kill -USR1 6546 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6546 killed at Mon Mar 26 17:37:28 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9280 starting at Mon Mar 26 17:37:28 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6622 >/dev/null 2>/dev/null selfserv_9280 with PID 6622 found at Mon Mar 26 17:37:28 EDT 2012 selfserv_9280 with PID 6622 started at Mon Mar 26 17:37:28 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:28 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:29 EDT 2012 ssl.sh: #1010: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6622 at Mon Mar 26 17:37:29 EDT 2012 kill -USR1 6622 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6622 killed at Mon Mar 26 17:37:29 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9280 starting at Mon Mar 26 17:37:29 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6698 >/dev/null 2>/dev/null selfserv_9280 with PID 6698 found at Mon Mar 26 17:37:29 EDT 2012 selfserv_9280 with PID 6698 started at Mon Mar 26 17:37:29 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:29 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:37:30 EDT 2012 ssl.sh: #1011: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6698 at Mon Mar 26 17:37:30 EDT 2012 kill -USR1 6698 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6698 killed at Mon Mar 26 17:37:30 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9280 starting at Mon Mar 26 17:37:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6774 >/dev/null 2>/dev/null selfserv_9280 with PID 6774 found at Mon Mar 26 17:37:30 EDT 2012 selfserv_9280 with PID 6774 started at Mon Mar 26 17:37:30 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:30 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:37:31 EDT 2012 ssl.sh: #1012: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6774 at Mon Mar 26 17:37:31 EDT 2012 kill -USR1 6774 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6774 killed at Mon Mar 26 17:37:31 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9280 starting at Mon Mar 26 17:37:31 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6856 >/dev/null 2>/dev/null selfserv_9280 with PID 6856 found at Mon Mar 26 17:37:31 EDT 2012 selfserv_9280 with PID 6856 started at Mon Mar 26 17:37:31 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:31 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:37:32 EDT 2012 ssl.sh: #1013: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6856 at Mon Mar 26 17:37:32 EDT 2012 kill -USR1 6856 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6856 killed at Mon Mar 26 17:37:32 EDT 2012 ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:32 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6953 >/dev/null 2>/dev/null selfserv_9280 with PID 6953 found at Mon Mar 26 17:37:32 EDT 2012 selfserv_9280 with PID 6953 started at Mon Mar 26 17:37:32 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:32 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: SSL2 - 100 server certificates tested. strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:37:32 EDT 2012 ssl.sh: #1014: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6953 at Mon Mar 26 17:37:32 EDT 2012 kill -USR1 6953 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6953 killed at Mon Mar 26 17:37:32 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:32 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7028 >/dev/null 2>/dev/null selfserv_9280 with PID 7028 found at Mon Mar 26 17:37:33 EDT 2012 selfserv_9280 with PID 7028 started at Mon Mar 26 17:37:33 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:33 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:37:33 EDT 2012 ssl.sh: #1015: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7028 at Mon Mar 26 17:37:33 EDT 2012 kill -USR1 7028 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7028 killed at Mon Mar 26 17:37:33 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:33 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:33 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7103 >/dev/null 2>/dev/null selfserv_9280 with PID 7103 found at Mon Mar 26 17:37:33 EDT 2012 selfserv_9280 with PID 7103 started at Mon Mar 26 17:37:33 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:33 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:37:34 EDT 2012 ssl.sh: #1016: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7103 at Mon Mar 26 17:37:34 EDT 2012 kill -USR1 7103 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7103 killed at Mon Mar 26 17:37:34 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:34 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:34 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7178 >/dev/null 2>/dev/null selfserv_9280 with PID 7178 found at Mon Mar 26 17:37:34 EDT 2012 selfserv_9280 with PID 7178 started at Mon Mar 26 17:37:34 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:34 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:37:34 EDT 2012 ssl.sh: #1017: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7178 at Mon Mar 26 17:37:34 EDT 2012 kill -USR1 7178 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7178 killed at Mon Mar 26 17:37:34 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:34 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:34 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7254 >/dev/null 2>/dev/null selfserv_9280 with PID 7254 found at Mon Mar 26 17:37:34 EDT 2012 selfserv_9280 with PID 7254 started at Mon Mar 26 17:37:34 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:34 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:35 EDT 2012 ssl.sh: #1018: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7254 at Mon Mar 26 17:37:35 EDT 2012 kill -USR1 7254 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7254 killed at Mon Mar 26 17:37:35 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:37:35 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:35 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7330 >/dev/null 2>/dev/null selfserv_9280 with PID 7330 found at Mon Mar 26 17:37:35 EDT 2012 selfserv_9280 with PID 7330 started at Mon Mar 26 17:37:35 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:35 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:35 EDT 2012 ssl.sh: #1019: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7330 at Mon Mar 26 17:37:35 EDT 2012 kill -USR1 7330 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7330 killed at Mon Mar 26 17:37:35 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:35 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:35 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7406 >/dev/null 2>/dev/null selfserv_9280 with PID 7406 found at Mon Mar 26 17:37:35 EDT 2012 selfserv_9280 with PID 7406 started at Mon Mar 26 17:37:35 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:35 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:37:35 EDT 2012 ssl.sh: #1020: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7406 at Mon Mar 26 17:37:35 EDT 2012 kill -USR1 7406 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7406 killed at Mon Mar 26 17:37:35 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:37:35 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:35 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7482 >/dev/null 2>/dev/null selfserv_9280 with PID 7482 found at Mon Mar 26 17:37:35 EDT 2012 selfserv_9280 with PID 7482 started at Mon Mar 26 17:37:35 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:35 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:37:35 EDT 2012 ssl.sh: #1021: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7482 at Mon Mar 26 17:37:35 EDT 2012 kill -USR1 7482 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7482 killed at Mon Mar 26 17:37:35 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9280 starting at Mon Mar 26 17:37:35 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:35 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7564 >/dev/null 2>/dev/null selfserv_9280 with PID 7564 found at Mon Mar 26 17:37:35 EDT 2012 selfserv_9280 with PID 7564 started at Mon Mar 26 17:37:35 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:36 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:37:36 EDT 2012 ssl.sh: #1022: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7564 at Mon Mar 26 17:37:36 EDT 2012 kill -USR1 7564 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7564 killed at Mon Mar 26 17:37:36 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9280 starting at Mon Mar 26 17:37:36 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:36 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7646 >/dev/null 2>/dev/null selfserv_9280 with PID 7646 found at Mon Mar 26 17:37:36 EDT 2012 selfserv_9280 with PID 7646 started at Mon Mar 26 17:37:36 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:36 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:37:37 EDT 2012 ssl.sh: #1023: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7646 at Mon Mar 26 17:37:37 EDT 2012 kill -USR1 7646 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7646 killed at Mon Mar 26 17:37:37 EDT 2012 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage Extended Test - server normal/client bypass =============================== selfserv_9280 starting at Mon Mar 26 17:37:37 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:37 EDT 2012 selfserv_9280 with PID 7799 started at Mon Mar 26 17:37:37 EDT 2012 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c f -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c g -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c l -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c m -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c f -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c g -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c l -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c m -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 7799 >/dev/null 2>/dev/null selfserv_9280 with PID 7799 found at Mon Mar 26 17:37:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9280 with PID 7799 at Mon Mar 26 17:37:39 EDT 2012 kill -USR1 7799 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7799 killed at Mon Mar 26 17:37:39 EDT 2012 ssl.sh: SSL Client Authentication Extended Test - server normal/client bypass =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:40 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 9267 >/dev/null 2>/dev/null selfserv_9280 with PID 9267 found at Mon Mar 26 17:37:40 EDT 2012 selfserv_9280 with PID 9267 started at Mon Mar 26 17:37:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 9267 at Mon Mar 26 17:37:40 EDT 2012 kill -USR1 9267 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 9267 killed at Mon Mar 26 17:37:40 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:40 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 9324 >/dev/null 2>/dev/null selfserv_9280 with PID 9324 found at Mon Mar 26 17:37:40 EDT 2012 selfserv_9280 with PID 9324 started at Mon Mar 26 17:37:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 9324 at Mon Mar 26 17:37:40 EDT 2012 kill -USR1 9324 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 9324 killed at Mon Mar 26 17:37:40 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:40 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 9381 >/dev/null 2>/dev/null selfserv_9280 with PID 9381 found at Mon Mar 26 17:37:40 EDT 2012 selfserv_9280 with PID 9381 started at Mon Mar 26 17:37:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 9381 at Mon Mar 26 17:37:40 EDT 2012 kill -USR1 9381 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 9381 killed at Mon Mar 26 17:37:40 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:40 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 9438 >/dev/null 2>/dev/null selfserv_9280 with PID 9438 found at Mon Mar 26 17:37:40 EDT 2012 selfserv_9280 with PID 9438 started at Mon Mar 26 17:37:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1055: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 9438 at Mon Mar 26 17:37:40 EDT 2012 kill -USR1 9438 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 9438 killed at Mon Mar 26 17:37:40 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:40 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 9495 >/dev/null 2>/dev/null selfserv_9280 with PID 9495 found at Mon Mar 26 17:37:40 EDT 2012 selfserv_9280 with PID 9495 started at Mon Mar 26 17:37:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1056: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 9495 at Mon Mar 26 17:37:41 EDT 2012 kill -USR1 9495 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 9495 killed at Mon Mar 26 17:37:41 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:41 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 9552 >/dev/null 2>/dev/null selfserv_9280 with PID 9552 found at Mon Mar 26 17:37:41 EDT 2012 selfserv_9280 with PID 9552 started at Mon Mar 26 17:37:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 9552 at Mon Mar 26 17:37:41 EDT 2012 kill -USR1 9552 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 9552 killed at Mon Mar 26 17:37:41 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:41 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 9609 >/dev/null 2>/dev/null selfserv_9280 with PID 9609 found at Mon Mar 26 17:37:41 EDT 2012 selfserv_9280 with PID 9609 started at Mon Mar 26 17:37:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 9609 at Mon Mar 26 17:37:41 EDT 2012 kill -USR1 9609 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 9609 killed at Mon Mar 26 17:37:41 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:41 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 9666 >/dev/null 2>/dev/null selfserv_9280 with PID 9666 found at Mon Mar 26 17:37:41 EDT 2012 selfserv_9280 with PID 9666 started at Mon Mar 26 17:37:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 9666 at Mon Mar 26 17:37:41 EDT 2012 kill -USR1 9666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 9666 killed at Mon Mar 26 17:37:41 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:41 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 9723 >/dev/null 2>/dev/null selfserv_9280 with PID 9723 found at Mon Mar 26 17:37:41 EDT 2012 selfserv_9280 with PID 9723 started at Mon Mar 26 17:37:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 9723 at Mon Mar 26 17:37:41 EDT 2012 kill -USR1 9723 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 9723 killed at Mon Mar 26 17:37:41 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:41 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 9780 >/dev/null 2>/dev/null selfserv_9280 with PID 9780 found at Mon Mar 26 17:37:41 EDT 2012 selfserv_9280 with PID 9780 started at Mon Mar 26 17:37:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1061: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 9780 at Mon Mar 26 17:37:42 EDT 2012 kill -USR1 9780 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 9780 killed at Mon Mar 26 17:37:42 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:42 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 9837 >/dev/null 2>/dev/null selfserv_9280 with PID 9837 found at Mon Mar 26 17:37:42 EDT 2012 selfserv_9280 with PID 9837 started at Mon Mar 26 17:37:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1062: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 9837 at Mon Mar 26 17:37:42 EDT 2012 kill -USR1 9837 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 9837 killed at Mon Mar 26 17:37:42 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:42 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 9894 >/dev/null 2>/dev/null selfserv_9280 with PID 9894 found at Mon Mar 26 17:37:42 EDT 2012 selfserv_9280 with PID 9894 started at Mon Mar 26 17:37:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 9894 at Mon Mar 26 17:37:42 EDT 2012 kill -USR1 9894 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 9894 killed at Mon Mar 26 17:37:42 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:42 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 9951 >/dev/null 2>/dev/null selfserv_9280 with PID 9951 found at Mon Mar 26 17:37:42 EDT 2012 selfserv_9280 with PID 9951 started at Mon Mar 26 17:37:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 9951 at Mon Mar 26 17:37:42 EDT 2012 kill -USR1 9951 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 9951 killed at Mon Mar 26 17:37:42 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:42 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 10008 >/dev/null 2>/dev/null selfserv_9280 with PID 10008 found at Mon Mar 26 17:37:42 EDT 2012 selfserv_9280 with PID 10008 started at Mon Mar 26 17:37:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 10008 at Mon Mar 26 17:37:42 EDT 2012 kill -USR1 10008 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 10008 killed at Mon Mar 26 17:37:42 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:42 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 10065 >/dev/null 2>/dev/null selfserv_9280 with PID 10065 found at Mon Mar 26 17:37:42 EDT 2012 selfserv_9280 with PID 10065 started at Mon Mar 26 17:37:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 10065 at Mon Mar 26 17:37:43 EDT 2012 kill -USR1 10065 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 10065 killed at Mon Mar 26 17:37:43 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:43 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 10122 >/dev/null 2>/dev/null selfserv_9280 with PID 10122 found at Mon Mar 26 17:37:43 EDT 2012 selfserv_9280 with PID 10122 started at Mon Mar 26 17:37:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1067: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 10122 at Mon Mar 26 17:37:43 EDT 2012 kill -USR1 10122 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 10122 killed at Mon Mar 26 17:37:43 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:43 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 10179 >/dev/null 2>/dev/null selfserv_9280 with PID 10179 found at Mon Mar 26 17:37:43 EDT 2012 selfserv_9280 with PID 10179 started at Mon Mar 26 17:37:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1068: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 10179 at Mon Mar 26 17:37:43 EDT 2012 kill -USR1 10179 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 10179 killed at Mon Mar 26 17:37:43 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:43 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 10236 >/dev/null 2>/dev/null selfserv_9280 with PID 10236 found at Mon Mar 26 17:37:43 EDT 2012 selfserv_9280 with PID 10236 started at Mon Mar 26 17:37:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 10236 at Mon Mar 26 17:37:43 EDT 2012 kill -USR1 10236 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 10236 killed at Mon Mar 26 17:37:43 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:43 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 10293 >/dev/null 2>/dev/null selfserv_9280 with PID 10293 found at Mon Mar 26 17:37:43 EDT 2012 selfserv_9280 with PID 10293 started at Mon Mar 26 17:37:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 10293 at Mon Mar 26 17:37:43 EDT 2012 kill -USR1 10293 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 10293 killed at Mon Mar 26 17:37:43 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:43 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 10350 >/dev/null 2>/dev/null selfserv_9280 with PID 10350 found at Mon Mar 26 17:37:43 EDT 2012 selfserv_9280 with PID 10350 started at Mon Mar 26 17:37:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 10350 at Mon Mar 26 17:37:44 EDT 2012 kill -USR1 10350 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 10350 killed at Mon Mar 26 17:37:44 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:44 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 10407 >/dev/null 2>/dev/null selfserv_9280 with PID 10407 found at Mon Mar 26 17:37:44 EDT 2012 selfserv_9280 with PID 10407 started at Mon Mar 26 17:37:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 10407 at Mon Mar 26 17:37:44 EDT 2012 kill -USR1 10407 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 10407 killed at Mon Mar 26 17:37:44 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:44 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 10464 >/dev/null 2>/dev/null selfserv_9280 with PID 10464 found at Mon Mar 26 17:37:44 EDT 2012 selfserv_9280 with PID 10464 started at Mon Mar 26 17:37:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1073: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 10464 at Mon Mar 26 17:37:44 EDT 2012 kill -USR1 10464 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 10464 killed at Mon Mar 26 17:37:44 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:44 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 10521 >/dev/null 2>/dev/null selfserv_9280 with PID 10521 found at Mon Mar 26 17:37:44 EDT 2012 selfserv_9280 with PID 10521 started at Mon Mar 26 17:37:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1074: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 10521 at Mon Mar 26 17:37:44 EDT 2012 kill -USR1 10521 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 10521 killed at Mon Mar 26 17:37:44 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:44 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 10578 >/dev/null 2>/dev/null selfserv_9280 with PID 10578 found at Mon Mar 26 17:37:44 EDT 2012 selfserv_9280 with PID 10578 started at Mon Mar 26 17:37:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 10578 at Mon Mar 26 17:37:44 EDT 2012 kill -USR1 10578 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 10578 killed at Mon Mar 26 17:37:44 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Stress Test Extended Test - server normal/client bypass =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:37:45 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 11013 >/dev/null 2>/dev/null selfserv_9280 with PID 11013 found at Mon Mar 26 17:37:45 EDT 2012 selfserv_9280 with PID 11013 started at Mon Mar 26 17:37:45 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:45 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:46 EDT 2012 ssl.sh: #1076: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 11013 at Mon Mar 26 17:37:46 EDT 2012 kill -USR1 11013 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 11013 killed at Mon Mar 26 17:37:46 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:37:46 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:46 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 11089 >/dev/null 2>/dev/null selfserv_9280 with PID 11089 found at Mon Mar 26 17:37:46 EDT 2012 selfserv_9280 with PID 11089 started at Mon Mar 26 17:37:46 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:46 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:46 EDT 2012 ssl.sh: #1077: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 11089 at Mon Mar 26 17:37:46 EDT 2012 kill -USR1 11089 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 11089 killed at Mon Mar 26 17:37:46 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9280 starting at Mon Mar 26 17:37:46 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:46 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 11165 >/dev/null 2>/dev/null selfserv_9280 with PID 11165 found at Mon Mar 26 17:37:46 EDT 2012 selfserv_9280 with PID 11165 started at Mon Mar 26 17:37:46 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:46 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:47 EDT 2012 ssl.sh: #1078: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 11165 at Mon Mar 26 17:37:47 EDT 2012 kill -USR1 11165 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 11165 killed at Mon Mar 26 17:37:47 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9280 starting at Mon Mar 26 17:37:47 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:47 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 11241 >/dev/null 2>/dev/null selfserv_9280 with PID 11241 found at Mon Mar 26 17:37:47 EDT 2012 selfserv_9280 with PID 11241 started at Mon Mar 26 17:37:47 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:47 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:37:48 EDT 2012 ssl.sh: #1079: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 11241 at Mon Mar 26 17:37:48 EDT 2012 kill -USR1 11241 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 11241 killed at Mon Mar 26 17:37:48 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9280 starting at Mon Mar 26 17:37:48 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:48 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 11317 >/dev/null 2>/dev/null selfserv_9280 with PID 11317 found at Mon Mar 26 17:37:48 EDT 2012 selfserv_9280 with PID 11317 started at Mon Mar 26 17:37:48 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:48 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:49 EDT 2012 ssl.sh: #1080: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 11317 at Mon Mar 26 17:37:49 EDT 2012 kill -USR1 11317 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 11317 killed at Mon Mar 26 17:37:49 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9280 starting at Mon Mar 26 17:37:49 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:49 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 11393 >/dev/null 2>/dev/null selfserv_9280 with PID 11393 found at Mon Mar 26 17:37:49 EDT 2012 selfserv_9280 with PID 11393 started at Mon Mar 26 17:37:49 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:49 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:37:50 EDT 2012 ssl.sh: #1081: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 11393 at Mon Mar 26 17:37:50 EDT 2012 kill -USR1 11393 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 11393 killed at Mon Mar 26 17:37:50 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9280 starting at Mon Mar 26 17:37:50 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:50 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 11469 >/dev/null 2>/dev/null selfserv_9280 with PID 11469 found at Mon Mar 26 17:37:50 EDT 2012 selfserv_9280 with PID 11469 started at Mon Mar 26 17:37:50 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:50 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:37:51 EDT 2012 ssl.sh: #1082: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 11469 at Mon Mar 26 17:37:51 EDT 2012 kill -USR1 11469 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 11469 killed at Mon Mar 26 17:37:51 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:51 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:51 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 11574 >/dev/null 2>/dev/null selfserv_9280 with PID 11574 found at Mon Mar 26 17:37:51 EDT 2012 selfserv_9280 with PID 11574 started at Mon Mar 26 17:37:51 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:51 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:37:52 EDT 2012 ssl.sh: #1083: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 11574 at Mon Mar 26 17:37:52 EDT 2012 kill -USR1 11574 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 11574 killed at Mon Mar 26 17:37:52 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:52 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:52 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 11649 >/dev/null 2>/dev/null selfserv_9280 with PID 11649 found at Mon Mar 26 17:37:52 EDT 2012 selfserv_9280 with PID 11649 started at Mon Mar 26 17:37:52 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:52 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:37:52 EDT 2012 ssl.sh: #1084: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 11649 at Mon Mar 26 17:37:53 EDT 2012 kill -USR1 11649 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 11649 killed at Mon Mar 26 17:37:53 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:53 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:53 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 11725 >/dev/null 2>/dev/null selfserv_9280 with PID 11725 found at Mon Mar 26 17:37:53 EDT 2012 selfserv_9280 with PID 11725 started at Mon Mar 26 17:37:53 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:53 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:37:53 EDT 2012 ssl.sh: #1085: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 11725 at Mon Mar 26 17:37:53 EDT 2012 kill -USR1 11725 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 11725 killed at Mon Mar 26 17:37:53 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:53 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:53 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 11801 >/dev/null 2>/dev/null selfserv_9280 with PID 11801 found at Mon Mar 26 17:37:53 EDT 2012 selfserv_9280 with PID 11801 started at Mon Mar 26 17:37:53 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:53 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:53 EDT 2012 ssl.sh: #1086: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 11801 at Mon Mar 26 17:37:53 EDT 2012 kill -USR1 11801 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 11801 killed at Mon Mar 26 17:37:53 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:37:53 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:53 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 11877 >/dev/null 2>/dev/null selfserv_9280 with PID 11877 found at Mon Mar 26 17:37:53 EDT 2012 selfserv_9280 with PID 11877 started at Mon Mar 26 17:37:53 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:53 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:37:53 EDT 2012 ssl.sh: #1087: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 11877 at Mon Mar 26 17:37:53 EDT 2012 kill -USR1 11877 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 11877 killed at Mon Mar 26 17:37:53 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:53 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:53 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 11953 >/dev/null 2>/dev/null selfserv_9280 with PID 11953 found at Mon Mar 26 17:37:53 EDT 2012 selfserv_9280 with PID 11953 started at Mon Mar 26 17:37:54 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:54 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:37:54 EDT 2012 ssl.sh: #1088: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 11953 at Mon Mar 26 17:37:54 EDT 2012 kill -USR1 11953 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 11953 killed at Mon Mar 26 17:37:54 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:37:54 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:54 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12029 >/dev/null 2>/dev/null selfserv_9280 with PID 12029 found at Mon Mar 26 17:37:54 EDT 2012 selfserv_9280 with PID 12029 started at Mon Mar 26 17:37:54 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:37:54 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:37:54 EDT 2012 ssl.sh: #1089: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 12029 at Mon Mar 26 17:37:54 EDT 2012 kill -USR1 12029 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12029 killed at Mon Mar 26 17:37:54 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -fips true -force FIPS mode enabled. ssl.sh: #1090: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -list ssl.sh: #1091: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1092: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -fips true -force FIPS mode enabled. ssl.sh: #1093: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -list ssl.sh: #1094: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1095: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9280 starting at Mon Mar 26 17:37:55 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:55 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:55 EDT 2012 selfserv_9280 with PID 12258 started at Mon Mar 26 17:37:55 EDT 2012 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:55 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1096: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:55 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1097: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:55 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1098: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:55 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1099: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:55 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1100: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:55 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1101: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1102: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1103: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1104: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1105: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1106: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1107: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1108: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1109: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1110: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1111: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1112: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1113: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1114: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 12258 >/dev/null 2>/dev/null selfserv_9280 with PID 12258 found at Mon Mar 26 17:37:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1115: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9280 with PID 12258 at Mon Mar 26 17:37:57 EDT 2012 kill -USR1 12258 selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 12258 killed at Mon Mar 26 17:37:57 EDT 2012 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:57 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13577 >/dev/null 2>/dev/null selfserv_9280 with PID 13577 found at Mon Mar 26 17:37:57 EDT 2012 selfserv_9280 with PID 13577 started at Mon Mar 26 17:37:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1116: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13577 at Mon Mar 26 17:37:57 EDT 2012 kill -USR1 13577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13577 killed at Mon Mar 26 17:37:57 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:57 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13634 >/dev/null 2>/dev/null selfserv_9280 with PID 13634 found at Mon Mar 26 17:37:57 EDT 2012 selfserv_9280 with PID 13634 started at Mon Mar 26 17:37:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1117: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13634 at Mon Mar 26 17:37:57 EDT 2012 kill -USR1 13634 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13634 killed at Mon Mar 26 17:37:57 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:57 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13691 >/dev/null 2>/dev/null selfserv_9280 with PID 13691 found at Mon Mar 26 17:37:57 EDT 2012 selfserv_9280 with PID 13691 started at Mon Mar 26 17:37:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1118: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13691 at Mon Mar 26 17:37:58 EDT 2012 kill -USR1 13691 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13691 killed at Mon Mar 26 17:37:58 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:58 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13748 >/dev/null 2>/dev/null selfserv_9280 with PID 13748 found at Mon Mar 26 17:37:58 EDT 2012 selfserv_9280 with PID 13748 started at Mon Mar 26 17:37:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1119: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 13748 at Mon Mar 26 17:37:58 EDT 2012 kill -USR1 13748 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13748 killed at Mon Mar 26 17:37:58 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:58 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13805 >/dev/null 2>/dev/null selfserv_9280 with PID 13805 found at Mon Mar 26 17:37:58 EDT 2012 selfserv_9280 with PID 13805 started at Mon Mar 26 17:37:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1120: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 13805 at Mon Mar 26 17:37:58 EDT 2012 kill -USR1 13805 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13805 killed at Mon Mar 26 17:37:58 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:58 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13862 >/dev/null 2>/dev/null selfserv_9280 with PID 13862 found at Mon Mar 26 17:37:58 EDT 2012 selfserv_9280 with PID 13862 started at Mon Mar 26 17:37:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1121: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13862 at Mon Mar 26 17:37:58 EDT 2012 kill -USR1 13862 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13862 killed at Mon Mar 26 17:37:59 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:59 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13919 >/dev/null 2>/dev/null selfserv_9280 with PID 13919 found at Mon Mar 26 17:37:59 EDT 2012 selfserv_9280 with PID 13919 started at Mon Mar 26 17:37:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1122: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13919 at Mon Mar 26 17:37:59 EDT 2012 kill -USR1 13919 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13919 killed at Mon Mar 26 17:37:59 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:37:59 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13976 >/dev/null 2>/dev/null selfserv_9280 with PID 13976 found at Mon Mar 26 17:37:59 EDT 2012 selfserv_9280 with PID 13976 started at Mon Mar 26 17:37:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13976 at Mon Mar 26 17:37:59 EDT 2012 kill -USR1 13976 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13976 killed at Mon Mar 26 17:37:59 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:59 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14033 >/dev/null 2>/dev/null selfserv_9280 with PID 14033 found at Mon Mar 26 17:37:59 EDT 2012 selfserv_9280 with PID 14033 started at Mon Mar 26 17:37:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14033 at Mon Mar 26 17:37:59 EDT 2012 kill -USR1 14033 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14033 killed at Mon Mar 26 17:37:59 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:37:59 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:37:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14090 >/dev/null 2>/dev/null selfserv_9280 with PID 14090 found at Mon Mar 26 17:37:59 EDT 2012 selfserv_9280 with PID 14090 started at Mon Mar 26 17:37:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1125: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 14090 at Mon Mar 26 17:38:00 EDT 2012 kill -USR1 14090 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14090 killed at Mon Mar 26 17:38:00 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:38:00 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14147 >/dev/null 2>/dev/null selfserv_9280 with PID 14147 found at Mon Mar 26 17:38:00 EDT 2012 selfserv_9280 with PID 14147 started at Mon Mar 26 17:38:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1126: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 14147 at Mon Mar 26 17:38:00 EDT 2012 kill -USR1 14147 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14147 killed at Mon Mar 26 17:38:00 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:00 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14204 >/dev/null 2>/dev/null selfserv_9280 with PID 14204 found at Mon Mar 26 17:38:00 EDT 2012 selfserv_9280 with PID 14204 started at Mon Mar 26 17:38:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14204 at Mon Mar 26 17:38:00 EDT 2012 kill -USR1 14204 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14204 killed at Mon Mar 26 17:38:00 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:00 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14261 >/dev/null 2>/dev/null selfserv_9280 with PID 14261 found at Mon Mar 26 17:38:00 EDT 2012 selfserv_9280 with PID 14261 started at Mon Mar 26 17:38:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14261 at Mon Mar 26 17:38:00 EDT 2012 kill -USR1 14261 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14261 killed at Mon Mar 26 17:38:00 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:38:00 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14318 >/dev/null 2>/dev/null selfserv_9280 with PID 14318 found at Mon Mar 26 17:38:01 EDT 2012 selfserv_9280 with PID 14318 started at Mon Mar 26 17:38:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14318 at Mon Mar 26 17:38:01 EDT 2012 kill -USR1 14318 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14318 killed at Mon Mar 26 17:38:01 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:01 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14375 >/dev/null 2>/dev/null selfserv_9280 with PID 14375 found at Mon Mar 26 17:38:01 EDT 2012 selfserv_9280 with PID 14375 started at Mon Mar 26 17:38:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14375 at Mon Mar 26 17:38:01 EDT 2012 kill -USR1 14375 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14375 killed at Mon Mar 26 17:38:01 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:01 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14432 >/dev/null 2>/dev/null selfserv_9280 with PID 14432 found at Mon Mar 26 17:38:01 EDT 2012 selfserv_9280 with PID 14432 started at Mon Mar 26 17:38:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1131: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 14432 at Mon Mar 26 17:38:01 EDT 2012 kill -USR1 14432 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14432 killed at Mon Mar 26 17:38:01 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:38:01 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14489 >/dev/null 2>/dev/null selfserv_9280 with PID 14489 found at Mon Mar 26 17:38:01 EDT 2012 selfserv_9280 with PID 14489 started at Mon Mar 26 17:38:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1132: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 14489 at Mon Mar 26 17:38:02 EDT 2012 kill -USR1 14489 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14489 killed at Mon Mar 26 17:38:02 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14546 >/dev/null 2>/dev/null selfserv_9280 with PID 14546 found at Mon Mar 26 17:38:02 EDT 2012 selfserv_9280 with PID 14546 started at Mon Mar 26 17:38:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14546 at Mon Mar 26 17:38:02 EDT 2012 kill -USR1 14546 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14546 killed at Mon Mar 26 17:38:02 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14603 >/dev/null 2>/dev/null selfserv_9280 with PID 14603 found at Mon Mar 26 17:38:02 EDT 2012 selfserv_9280 with PID 14603 started at Mon Mar 26 17:38:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14603 at Mon Mar 26 17:38:02 EDT 2012 kill -USR1 14603 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14603 killed at Mon Mar 26 17:38:02 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:38:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14660 >/dev/null 2>/dev/null selfserv_9280 with PID 14660 found at Mon Mar 26 17:38:02 EDT 2012 selfserv_9280 with PID 14660 started at Mon Mar 26 17:38:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14660 at Mon Mar 26 17:38:03 EDT 2012 kill -USR1 14660 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14660 killed at Mon Mar 26 17:38:03 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14717 >/dev/null 2>/dev/null selfserv_9280 with PID 14717 found at Mon Mar 26 17:38:03 EDT 2012 selfserv_9280 with PID 14717 started at Mon Mar 26 17:38:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14717 at Mon Mar 26 17:38:03 EDT 2012 kill -USR1 14717 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14717 killed at Mon Mar 26 17:38:03 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14774 >/dev/null 2>/dev/null selfserv_9280 with PID 14774 found at Mon Mar 26 17:38:03 EDT 2012 selfserv_9280 with PID 14774 started at Mon Mar 26 17:38:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1137: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 14774 at Mon Mar 26 17:38:03 EDT 2012 kill -USR1 14774 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14774 killed at Mon Mar 26 17:38:03 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:38:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14831 >/dev/null 2>/dev/null selfserv_9280 with PID 14831 found at Mon Mar 26 17:38:03 EDT 2012 selfserv_9280 with PID 14831 started at Mon Mar 26 17:38:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1138: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 14831 at Mon Mar 26 17:38:03 EDT 2012 kill -USR1 14831 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14831 killed at Mon Mar 26 17:38:03 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14888 >/dev/null 2>/dev/null selfserv_9280 with PID 14888 found at Mon Mar 26 17:38:04 EDT 2012 selfserv_9280 with PID 14888 started at Mon Mar 26 17:38:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14888 at Mon Mar 26 17:38:04 EDT 2012 kill -USR1 14888 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14888 killed at Mon Mar 26 17:38:04 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: TLS Server hello response without SNI ---- selfserv_9280 starting at Mon Mar 26 17:38:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15013 >/dev/null 2>/dev/null selfserv_9280 with PID 15013 found at Mon Mar 26 17:38:04 EDT 2012 selfserv_9280 with PID 15013 started at Mon Mar 26 17:38:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15013 at Mon Mar 26 17:38:04 EDT 2012 kill -USR1 15013 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15013 killed at Mon Mar 26 17:38:04 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9280 starting at Mon Mar 26 17:38:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15076 >/dev/null 2>/dev/null selfserv_9280 with PID 15076 found at Mon Mar 26 17:38:04 EDT 2012 selfserv_9280 with PID 15076 started at Mon Mar 26 17:38:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15076 at Mon Mar 26 17:38:04 EDT 2012 kill -USR1 15076 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15076 killed at Mon Mar 26 17:38:04 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9280 starting at Mon Mar 26 17:38:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15142 >/dev/null 2>/dev/null selfserv_9280 with PID 15142 found at Mon Mar 26 17:38:05 EDT 2012 selfserv_9280 with PID 15142 started at Mon Mar 26 17:38:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #1142: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 15142 at Mon Mar 26 17:38:05 EDT 2012 kill -USR1 15142 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15142 killed at Mon Mar 26 17:38:05 EDT 2012 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9280 starting at Mon Mar 26 17:38:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15205 >/dev/null 2>/dev/null selfserv_9280 with PID 15205 found at Mon Mar 26 17:38:05 EDT 2012 selfserv_9280 with PID 15205 started at Mon Mar 26 17:38:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15205 at Mon Mar 26 17:38:05 EDT 2012 kill -USR1 15205 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15205 killed at Mon Mar 26 17:38:05 EDT 2012 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9280 starting at Mon Mar 26 17:38:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15268 >/dev/null 2>/dev/null selfserv_9280 with PID 15268 found at Mon Mar 26 17:38:05 EDT 2012 selfserv_9280 with PID 15268 started at Mon Mar 26 17:38:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #1144: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 15268 at Mon Mar 26 17:38:05 EDT 2012 kill -USR1 15268 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15268 killed at Mon Mar 26 17:38:05 EDT 2012 ssl.sh: TLS Server hello response without SNI ---- selfserv_9280 starting at Mon Mar 26 17:38:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15331 >/dev/null 2>/dev/null selfserv_9280 with PID 15331 found at Mon Mar 26 17:38:05 EDT 2012 selfserv_9280 with PID 15331 started at Mon Mar 26 17:38:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15331 at Mon Mar 26 17:38:06 EDT 2012 kill -USR1 15331 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15331 killed at Mon Mar 26 17:38:06 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9280 starting at Mon Mar 26 17:38:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15394 >/dev/null 2>/dev/null selfserv_9280 with PID 15394 found at Mon Mar 26 17:38:06 EDT 2012 selfserv_9280 with PID 15394 started at Mon Mar 26 17:38:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15394 at Mon Mar 26 17:38:06 EDT 2012 kill -USR1 15394 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15394 killed at Mon Mar 26 17:38:06 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9280 starting at Mon Mar 26 17:38:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15457 >/dev/null 2>/dev/null selfserv_9280 with PID 15457 found at Mon Mar 26 17:38:06 EDT 2012 selfserv_9280 with PID 15457 started at Mon Mar 26 17:38:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #1147: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 15457 at Mon Mar 26 17:38:06 EDT 2012 kill -USR1 15457 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15457 killed at Mon Mar 26 17:38:06 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9280 starting at Mon Mar 26 17:38:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15520 >/dev/null 2>/dev/null selfserv_9280 with PID 15520 found at Mon Mar 26 17:38:06 EDT 2012 selfserv_9280 with PID 15520 started at Mon Mar 26 17:38:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #1148: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 15520 at Mon Mar 26 17:38:07 EDT 2012 kill -USR1 15520 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15520 killed at Mon Mar 26 17:38:07 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9280 starting at Mon Mar 26 17:38:07 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15583 >/dev/null 2>/dev/null selfserv_9280 with PID 15583 found at Mon Mar 26 17:38:07 EDT 2012 selfserv_9280 with PID 15583 started at Mon Mar 26 17:38:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #1149: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 15583 at Mon Mar 26 17:38:07 EDT 2012 kill -USR1 15583 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15583 killed at Mon Mar 26 17:38:07 EDT 2012 ssl.sh: SSL Stress Test - server fips/client normal =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:38:07 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15936 >/dev/null 2>/dev/null selfserv_9280 with PID 15936 found at Mon Mar 26 17:38:07 EDT 2012 selfserv_9280 with PID 15936 started at Mon Mar 26 17:38:07 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:07 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:38:08 EDT 2012 ssl.sh: #1150: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 15936 at Mon Mar 26 17:38:08 EDT 2012 kill -USR1 15936 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15936 killed at Mon Mar 26 17:38:08 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:38:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16012 >/dev/null 2>/dev/null selfserv_9280 with PID 16012 found at Mon Mar 26 17:38:08 EDT 2012 selfserv_9280 with PID 16012 started at Mon Mar 26 17:38:08 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:08 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:38:09 EDT 2012 ssl.sh: #1151: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 16012 at Mon Mar 26 17:38:09 EDT 2012 kill -USR1 16012 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16012 killed at Mon Mar 26 17:38:09 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9280 starting at Mon Mar 26 17:38:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16088 >/dev/null 2>/dev/null selfserv_9280 with PID 16088 found at Mon Mar 26 17:38:09 EDT 2012 selfserv_9280 with PID 16088 started at Mon Mar 26 17:38:09 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:09 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:38:10 EDT 2012 ssl.sh: #1152: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 16088 at Mon Mar 26 17:38:10 EDT 2012 kill -USR1 16088 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16088 killed at Mon Mar 26 17:38:10 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9280 starting at Mon Mar 26 17:38:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16164 >/dev/null 2>/dev/null selfserv_9280 with PID 16164 found at Mon Mar 26 17:38:10 EDT 2012 selfserv_9280 with PID 16164 started at Mon Mar 26 17:38:10 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:10 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:38:11 EDT 2012 ssl.sh: #1153: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 16164 at Mon Mar 26 17:38:11 EDT 2012 kill -USR1 16164 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16164 killed at Mon Mar 26 17:38:11 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9280 starting at Mon Mar 26 17:38:11 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16240 >/dev/null 2>/dev/null selfserv_9280 with PID 16240 found at Mon Mar 26 17:38:11 EDT 2012 selfserv_9280 with PID 16240 started at Mon Mar 26 17:38:11 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:11 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:38:12 EDT 2012 ssl.sh: #1154: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 16240 at Mon Mar 26 17:38:12 EDT 2012 kill -USR1 16240 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16240 killed at Mon Mar 26 17:38:12 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9280 starting at Mon Mar 26 17:38:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16316 >/dev/null 2>/dev/null selfserv_9280 with PID 16316 found at Mon Mar 26 17:38:12 EDT 2012 selfserv_9280 with PID 16316 started at Mon Mar 26 17:38:12 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:12 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:38:13 EDT 2012 ssl.sh: #1155: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 16316 at Mon Mar 26 17:38:13 EDT 2012 kill -USR1 16316 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16316 killed at Mon Mar 26 17:38:13 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9280 starting at Mon Mar 26 17:38:13 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16392 >/dev/null 2>/dev/null selfserv_9280 with PID 16392 found at Mon Mar 26 17:38:13 EDT 2012 selfserv_9280 with PID 16392 started at Mon Mar 26 17:38:13 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:13 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:38:14 EDT 2012 ssl.sh: #1156: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 16392 at Mon Mar 26 17:38:14 EDT 2012 kill -USR1 16392 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16392 killed at Mon Mar 26 17:38:14 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9280 starting at Mon Mar 26 17:38:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16474 >/dev/null 2>/dev/null selfserv_9280 with PID 16474 found at Mon Mar 26 17:38:14 EDT 2012 selfserv_9280 with PID 16474 started at Mon Mar 26 17:38:14 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:14 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:38:15 EDT 2012 ssl.sh: #1157: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 16474 at Mon Mar 26 17:38:15 EDT 2012 kill -USR1 16474 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16474 killed at Mon Mar 26 17:38:15 EDT 2012 ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16575 >/dev/null 2>/dev/null selfserv_9280 with PID 16575 found at Mon Mar 26 17:38:15 EDT 2012 selfserv_9280 with PID 16575 started at Mon Mar 26 17:38:15 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:15 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:38:16 EDT 2012 ssl.sh: #1158: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 16575 at Mon Mar 26 17:38:16 EDT 2012 kill -USR1 16575 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16575 killed at Mon Mar 26 17:38:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16650 >/dev/null 2>/dev/null selfserv_9280 with PID 16650 found at Mon Mar 26 17:38:16 EDT 2012 selfserv_9280 with PID 16650 started at Mon Mar 26 17:38:16 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:38:17 EDT 2012 ssl.sh: #1159: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 16650 at Mon Mar 26 17:38:17 EDT 2012 kill -USR1 16650 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16650 killed at Mon Mar 26 17:38:17 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16725 >/dev/null 2>/dev/null selfserv_9280 with PID 16725 found at Mon Mar 26 17:38:17 EDT 2012 selfserv_9280 with PID 16725 started at Mon Mar 26 17:38:17 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:17 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:38:17 EDT 2012 ssl.sh: #1160: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 16725 at Mon Mar 26 17:38:17 EDT 2012 kill -USR1 16725 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16725 killed at Mon Mar 26 17:38:17 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16801 >/dev/null 2>/dev/null selfserv_9280 with PID 16801 found at Mon Mar 26 17:38:17 EDT 2012 selfserv_9280 with PID 16801 started at Mon Mar 26 17:38:17 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:17 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:38:18 EDT 2012 ssl.sh: #1161: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 16801 at Mon Mar 26 17:38:18 EDT 2012 kill -USR1 16801 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16801 killed at Mon Mar 26 17:38:18 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:38:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16879 >/dev/null 2>/dev/null selfserv_9280 with PID 16879 found at Mon Mar 26 17:38:18 EDT 2012 selfserv_9280 with PID 16879 started at Mon Mar 26 17:38:18 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:18 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:38:18 EDT 2012 ssl.sh: #1162: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 16879 at Mon Mar 26 17:38:18 EDT 2012 kill -USR1 16879 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16879 killed at Mon Mar 26 17:38:18 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16955 >/dev/null 2>/dev/null selfserv_9280 with PID 16955 found at Mon Mar 26 17:38:18 EDT 2012 selfserv_9280 with PID 16955 started at Mon Mar 26 17:38:18 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:18 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:38:19 EDT 2012 ssl.sh: #1163: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 16955 at Mon Mar 26 17:38:19 EDT 2012 kill -USR1 16955 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16955 killed at Mon Mar 26 17:38:19 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:38:19 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17031 >/dev/null 2>/dev/null selfserv_9280 with PID 17031 found at Mon Mar 26 17:38:19 EDT 2012 selfserv_9280 with PID 17031 started at Mon Mar 26 17:38:19 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:19 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:38:19 EDT 2012 ssl.sh: #1164: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 17031 at Mon Mar 26 17:38:19 EDT 2012 kill -USR1 17031 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17031 killed at Mon Mar 26 17:38:19 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9280 starting at Mon Mar 26 17:38:19 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17113 >/dev/null 2>/dev/null selfserv_9280 with PID 17113 found at Mon Mar 26 17:38:19 EDT 2012 selfserv_9280 with PID 17113 started at Mon Mar 26 17:38:19 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:19 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:38:20 EDT 2012 ssl.sh: #1165: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 17113 at Mon Mar 26 17:38:20 EDT 2012 kill -USR1 17113 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17113 killed at Mon Mar 26 17:38:20 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9280 starting at Mon Mar 26 17:38:20 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17195 >/dev/null 2>/dev/null selfserv_9280 with PID 17195 found at Mon Mar 26 17:38:20 EDT 2012 selfserv_9280 with PID 17195 started at Mon Mar 26 17:38:20 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:20 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:38:21 EDT 2012 ssl.sh: #1166: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 17195 at Mon Mar 26 17:38:21 EDT 2012 kill -USR1 17195 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17195 killed at Mon Mar 26 17:38:21 EDT 2012 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9280 starting at Mon Mar 26 17:38:21 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:21 EDT 2012 selfserv_9280 with PID 17348 started at Mon Mar 26 17:38:21 EDT 2012 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 17348 >/dev/null 2>/dev/null selfserv_9280 with PID 17348 found at Mon Mar 26 17:38:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9280 with PID 17348 at Mon Mar 26 17:38:23 EDT 2012 kill -USR1 17348 selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17348 killed at Mon Mar 26 17:38:23 EDT 2012 ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18664 >/dev/null 2>/dev/null selfserv_9280 with PID 18664 found at Mon Mar 26 17:38:23 EDT 2012 selfserv_9280 with PID 18664 started at Mon Mar 26 17:38:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 18664 at Mon Mar 26 17:38:24 EDT 2012 kill -USR1 18664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18664 killed at Mon Mar 26 17:38:24 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:38:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18721 >/dev/null 2>/dev/null selfserv_9280 with PID 18721 found at Mon Mar 26 17:38:24 EDT 2012 selfserv_9280 with PID 18721 started at Mon Mar 26 17:38:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 18721 at Mon Mar 26 17:38:24 EDT 2012 kill -USR1 18721 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18721 killed at Mon Mar 26 17:38:24 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18778 >/dev/null 2>/dev/null selfserv_9280 with PID 18778 found at Mon Mar 26 17:38:24 EDT 2012 selfserv_9280 with PID 18778 started at Mon Mar 26 17:38:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 18778 at Mon Mar 26 17:38:24 EDT 2012 kill -USR1 18778 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18778 killed at Mon Mar 26 17:38:24 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18835 >/dev/null 2>/dev/null selfserv_9280 with PID 18835 found at Mon Mar 26 17:38:24 EDT 2012 selfserv_9280 with PID 18835 started at Mon Mar 26 17:38:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1190: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 18835 at Mon Mar 26 17:38:24 EDT 2012 kill -USR1 18835 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18835 killed at Mon Mar 26 17:38:24 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:38:25 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18892 >/dev/null 2>/dev/null selfserv_9280 with PID 18892 found at Mon Mar 26 17:38:25 EDT 2012 selfserv_9280 with PID 18892 started at Mon Mar 26 17:38:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1191: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 18892 at Mon Mar 26 17:38:25 EDT 2012 kill -USR1 18892 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18892 killed at Mon Mar 26 17:38:25 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:25 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18949 >/dev/null 2>/dev/null selfserv_9280 with PID 18949 found at Mon Mar 26 17:38:25 EDT 2012 selfserv_9280 with PID 18949 started at Mon Mar 26 17:38:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 18949 at Mon Mar 26 17:38:25 EDT 2012 kill -USR1 18949 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18949 killed at Mon Mar 26 17:38:25 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:25 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19006 >/dev/null 2>/dev/null selfserv_9280 with PID 19006 found at Mon Mar 26 17:38:25 EDT 2012 selfserv_9280 with PID 19006 started at Mon Mar 26 17:38:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19006 at Mon Mar 26 17:38:25 EDT 2012 kill -USR1 19006 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19006 killed at Mon Mar 26 17:38:25 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:38:25 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19063 >/dev/null 2>/dev/null selfserv_9280 with PID 19063 found at Mon Mar 26 17:38:25 EDT 2012 selfserv_9280 with PID 19063 started at Mon Mar 26 17:38:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19063 at Mon Mar 26 17:38:26 EDT 2012 kill -USR1 19063 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19063 killed at Mon Mar 26 17:38:26 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:26 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19120 >/dev/null 2>/dev/null selfserv_9280 with PID 19120 found at Mon Mar 26 17:38:26 EDT 2012 selfserv_9280 with PID 19120 started at Mon Mar 26 17:38:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19120 at Mon Mar 26 17:38:26 EDT 2012 kill -USR1 19120 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19120 killed at Mon Mar 26 17:38:26 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:26 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19177 >/dev/null 2>/dev/null selfserv_9280 with PID 19177 found at Mon Mar 26 17:38:26 EDT 2012 selfserv_9280 with PID 19177 started at Mon Mar 26 17:38:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1196: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 19177 at Mon Mar 26 17:38:26 EDT 2012 kill -USR1 19177 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19177 killed at Mon Mar 26 17:38:26 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:38:26 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19234 >/dev/null 2>/dev/null selfserv_9280 with PID 19234 found at Mon Mar 26 17:38:26 EDT 2012 selfserv_9280 with PID 19234 started at Mon Mar 26 17:38:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1197: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 19234 at Mon Mar 26 17:38:27 EDT 2012 kill -USR1 19234 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19234 killed at Mon Mar 26 17:38:27 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19291 >/dev/null 2>/dev/null selfserv_9280 with PID 19291 found at Mon Mar 26 17:38:27 EDT 2012 selfserv_9280 with PID 19291 started at Mon Mar 26 17:38:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19291 at Mon Mar 26 17:38:27 EDT 2012 kill -USR1 19291 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19291 killed at Mon Mar 26 17:38:27 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19348 >/dev/null 2>/dev/null selfserv_9280 with PID 19348 found at Mon Mar 26 17:38:27 EDT 2012 selfserv_9280 with PID 19348 started at Mon Mar 26 17:38:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19348 at Mon Mar 26 17:38:27 EDT 2012 kill -USR1 19348 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19348 killed at Mon Mar 26 17:38:27 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:38:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19405 >/dev/null 2>/dev/null selfserv_9280 with PID 19405 found at Mon Mar 26 17:38:27 EDT 2012 selfserv_9280 with PID 19405 started at Mon Mar 26 17:38:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19405 at Mon Mar 26 17:38:27 EDT 2012 kill -USR1 19405 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19405 killed at Mon Mar 26 17:38:27 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19462 >/dev/null 2>/dev/null selfserv_9280 with PID 19462 found at Mon Mar 26 17:38:27 EDT 2012 selfserv_9280 with PID 19462 started at Mon Mar 26 17:38:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19462 at Mon Mar 26 17:38:28 EDT 2012 kill -USR1 19462 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19462 killed at Mon Mar 26 17:38:28 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:28 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19519 >/dev/null 2>/dev/null selfserv_9280 with PID 19519 found at Mon Mar 26 17:38:28 EDT 2012 selfserv_9280 with PID 19519 started at Mon Mar 26 17:38:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1202: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 19519 at Mon Mar 26 17:38:28 EDT 2012 kill -USR1 19519 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19519 killed at Mon Mar 26 17:38:28 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:38:28 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19576 >/dev/null 2>/dev/null selfserv_9280 with PID 19576 found at Mon Mar 26 17:38:28 EDT 2012 selfserv_9280 with PID 19576 started at Mon Mar 26 17:38:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1203: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 19576 at Mon Mar 26 17:38:28 EDT 2012 kill -USR1 19576 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19576 killed at Mon Mar 26 17:38:28 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:28 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19633 >/dev/null 2>/dev/null selfserv_9280 with PID 19633 found at Mon Mar 26 17:38:28 EDT 2012 selfserv_9280 with PID 19633 started at Mon Mar 26 17:38:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19633 at Mon Mar 26 17:38:29 EDT 2012 kill -USR1 19633 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19633 killed at Mon Mar 26 17:38:29 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:29 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19690 >/dev/null 2>/dev/null selfserv_9280 with PID 19690 found at Mon Mar 26 17:38:29 EDT 2012 selfserv_9280 with PID 19690 started at Mon Mar 26 17:38:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19690 at Mon Mar 26 17:38:29 EDT 2012 kill -USR1 19690 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19690 killed at Mon Mar 26 17:38:29 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:38:29 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19747 >/dev/null 2>/dev/null selfserv_9280 with PID 19747 found at Mon Mar 26 17:38:29 EDT 2012 selfserv_9280 with PID 19747 started at Mon Mar 26 17:38:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19747 at Mon Mar 26 17:38:29 EDT 2012 kill -USR1 19747 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19747 killed at Mon Mar 26 17:38:29 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:29 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19804 >/dev/null 2>/dev/null selfserv_9280 with PID 19804 found at Mon Mar 26 17:38:29 EDT 2012 selfserv_9280 with PID 19804 started at Mon Mar 26 17:38:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19804 at Mon Mar 26 17:38:29 EDT 2012 kill -USR1 19804 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19804 killed at Mon Mar 26 17:38:29 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19861 >/dev/null 2>/dev/null selfserv_9280 with PID 19861 found at Mon Mar 26 17:38:30 EDT 2012 selfserv_9280 with PID 19861 started at Mon Mar 26 17:38:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1208: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 19861 at Mon Mar 26 17:38:30 EDT 2012 kill -USR1 19861 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19861 killed at Mon Mar 26 17:38:30 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:38:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19918 >/dev/null 2>/dev/null selfserv_9280 with PID 19918 found at Mon Mar 26 17:38:30 EDT 2012 selfserv_9280 with PID 19918 started at Mon Mar 26 17:38:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1209: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 19918 at Mon Mar 26 17:38:30 EDT 2012 kill -USR1 19918 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19918 killed at Mon Mar 26 17:38:30 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19975 >/dev/null 2>/dev/null selfserv_9280 with PID 19975 found at Mon Mar 26 17:38:30 EDT 2012 selfserv_9280 with PID 19975 started at Mon Mar 26 17:38:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19975 at Mon Mar 26 17:38:30 EDT 2012 kill -USR1 19975 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19975 killed at Mon Mar 26 17:38:30 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Stress Test Extended Test - server fips/client normal =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:38:31 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20410 >/dev/null 2>/dev/null selfserv_9280 with PID 20410 found at Mon Mar 26 17:38:31 EDT 2012 selfserv_9280 with PID 20410 started at Mon Mar 26 17:38:31 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:31 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:38:32 EDT 2012 ssl.sh: #1211: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 20410 at Mon Mar 26 17:38:32 EDT 2012 kill -USR1 20410 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20410 killed at Mon Mar 26 17:38:32 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:38:32 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20486 >/dev/null 2>/dev/null selfserv_9280 with PID 20486 found at Mon Mar 26 17:38:32 EDT 2012 selfserv_9280 with PID 20486 started at Mon Mar 26 17:38:32 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:32 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:38:33 EDT 2012 ssl.sh: #1212: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 20486 at Mon Mar 26 17:38:33 EDT 2012 kill -USR1 20486 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20486 killed at Mon Mar 26 17:38:33 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9280 starting at Mon Mar 26 17:38:33 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:33 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20562 >/dev/null 2>/dev/null selfserv_9280 with PID 20562 found at Mon Mar 26 17:38:33 EDT 2012 selfserv_9280 with PID 20562 started at Mon Mar 26 17:38:33 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:33 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:38:33 EDT 2012 ssl.sh: #1213: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 20562 at Mon Mar 26 17:38:33 EDT 2012 kill -USR1 20562 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20562 killed at Mon Mar 26 17:38:33 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9280 starting at Mon Mar 26 17:38:33 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:33 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20638 >/dev/null 2>/dev/null selfserv_9280 with PID 20638 found at Mon Mar 26 17:38:33 EDT 2012 selfserv_9280 with PID 20638 started at Mon Mar 26 17:38:33 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:33 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:38:34 EDT 2012 ssl.sh: #1214: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 20638 at Mon Mar 26 17:38:34 EDT 2012 kill -USR1 20638 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20638 killed at Mon Mar 26 17:38:34 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9280 starting at Mon Mar 26 17:38:34 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:34 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20714 >/dev/null 2>/dev/null selfserv_9280 with PID 20714 found at Mon Mar 26 17:38:34 EDT 2012 selfserv_9280 with PID 20714 started at Mon Mar 26 17:38:34 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:34 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:38:36 EDT 2012 ssl.sh: #1215: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 20714 at Mon Mar 26 17:38:36 EDT 2012 kill -USR1 20714 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20714 killed at Mon Mar 26 17:38:36 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9280 starting at Mon Mar 26 17:38:36 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:36 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20790 >/dev/null 2>/dev/null selfserv_9280 with PID 20790 found at Mon Mar 26 17:38:36 EDT 2012 selfserv_9280 with PID 20790 started at Mon Mar 26 17:38:36 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:36 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:38:37 EDT 2012 ssl.sh: #1216: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 20790 at Mon Mar 26 17:38:37 EDT 2012 kill -USR1 20790 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20790 killed at Mon Mar 26 17:38:37 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9280 starting at Mon Mar 26 17:38:37 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20866 >/dev/null 2>/dev/null selfserv_9280 with PID 20866 found at Mon Mar 26 17:38:37 EDT 2012 selfserv_9280 with PID 20866 started at Mon Mar 26 17:38:37 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:37 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:38:38 EDT 2012 ssl.sh: #1217: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 20866 at Mon Mar 26 17:38:38 EDT 2012 kill -USR1 20866 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20866 killed at Mon Mar 26 17:38:38 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:38 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:38 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20971 >/dev/null 2>/dev/null selfserv_9280 with PID 20971 found at Mon Mar 26 17:38:38 EDT 2012 selfserv_9280 with PID 20971 started at Mon Mar 26 17:38:38 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:38 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:38:39 EDT 2012 ssl.sh: #1218: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 20971 at Mon Mar 26 17:38:39 EDT 2012 kill -USR1 20971 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20971 killed at Mon Mar 26 17:38:39 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:39 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:39 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 21046 >/dev/null 2>/dev/null selfserv_9280 with PID 21046 found at Mon Mar 26 17:38:39 EDT 2012 selfserv_9280 with PID 21046 started at Mon Mar 26 17:38:39 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:39 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:38:40 EDT 2012 ssl.sh: #1219: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 21046 at Mon Mar 26 17:38:40 EDT 2012 kill -USR1 21046 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 21046 killed at Mon Mar 26 17:38:40 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:40 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 21121 >/dev/null 2>/dev/null selfserv_9280 with PID 21121 found at Mon Mar 26 17:38:40 EDT 2012 selfserv_9280 with PID 21121 started at Mon Mar 26 17:38:40 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:40 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:38:40 EDT 2012 ssl.sh: #1220: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 21121 at Mon Mar 26 17:38:40 EDT 2012 kill -USR1 21121 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 21121 killed at Mon Mar 26 17:38:40 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:40 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 21197 >/dev/null 2>/dev/null selfserv_9280 with PID 21197 found at Mon Mar 26 17:38:40 EDT 2012 selfserv_9280 with PID 21197 started at Mon Mar 26 17:38:40 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:40 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:38:41 EDT 2012 ssl.sh: #1221: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 21197 at Mon Mar 26 17:38:41 EDT 2012 kill -USR1 21197 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 21197 killed at Mon Mar 26 17:38:41 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:38:41 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 21273 >/dev/null 2>/dev/null selfserv_9280 with PID 21273 found at Mon Mar 26 17:38:41 EDT 2012 selfserv_9280 with PID 21273 started at Mon Mar 26 17:38:41 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:41 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:38:41 EDT 2012 ssl.sh: #1222: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 21273 at Mon Mar 26 17:38:41 EDT 2012 kill -USR1 21273 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 21273 killed at Mon Mar 26 17:38:41 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:41 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 21349 >/dev/null 2>/dev/null selfserv_9280 with PID 21349 found at Mon Mar 26 17:38:41 EDT 2012 selfserv_9280 with PID 21349 started at Mon Mar 26 17:38:41 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:41 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:38:42 EDT 2012 ssl.sh: #1223: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 21349 at Mon Mar 26 17:38:42 EDT 2012 kill -USR1 21349 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 21349 killed at Mon Mar 26 17:38:42 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:38:42 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 21427 >/dev/null 2>/dev/null selfserv_9280 with PID 21427 found at Mon Mar 26 17:38:42 EDT 2012 selfserv_9280 with PID 21427 started at Mon Mar 26 17:38:42 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:42 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:38:42 EDT 2012 ssl.sh: #1224: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 21427 at Mon Mar 26 17:38:42 EDT 2012 kill -USR1 21427 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 21427 killed at Mon Mar 26 17:38:42 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -fips false -force FIPS mode disabled. ssl.sh: #1225: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/server -list ssl.sh: #1226: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1227: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1228: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_server -list ssl.sh: #1229: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1230: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1231: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -list ssl.sh: #1232: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1233: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9280 starting at Mon Mar 26 17:38:43 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:43 EDT 2012 selfserv_9280 with PID 21689 started at Mon Mar 26 17:38:43 EDT 2012 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -T -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1244: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1245: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1246: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1247: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1248: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1249: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1250: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1251: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1252: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 21689 >/dev/null 2>/dev/null selfserv_9280 with PID 21689 found at Mon Mar 26 17:38:44 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1253: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9280 with PID 21689 at Mon Mar 26 17:38:45 EDT 2012 kill -USR1 21689 selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 21689 killed at Mon Mar 26 17:38:45 EDT 2012 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:45 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23014 >/dev/null 2>/dev/null selfserv_9280 with PID 23014 found at Mon Mar 26 17:38:45 EDT 2012 selfserv_9280 with PID 23014 started at Mon Mar 26 17:38:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1254: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 23014 at Mon Mar 26 17:38:45 EDT 2012 kill -USR1 23014 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23014 killed at Mon Mar 26 17:38:45 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:38:45 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23071 >/dev/null 2>/dev/null selfserv_9280 with PID 23071 found at Mon Mar 26 17:38:45 EDT 2012 selfserv_9280 with PID 23071 started at Mon Mar 26 17:38:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1255: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 23071 at Mon Mar 26 17:38:45 EDT 2012 kill -USR1 23071 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23071 killed at Mon Mar 26 17:38:45 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:45 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23128 >/dev/null 2>/dev/null selfserv_9280 with PID 23128 found at Mon Mar 26 17:38:45 EDT 2012 selfserv_9280 with PID 23128 started at Mon Mar 26 17:38:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1256: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 23128 at Mon Mar 26 17:38:45 EDT 2012 kill -USR1 23128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23128 killed at Mon Mar 26 17:38:45 EDT 2012 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:45 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23191 >/dev/null 2>/dev/null selfserv_9280 with PID 23191 found at Mon Mar 26 17:38:45 EDT 2012 selfserv_9280 with PID 23191 started at Mon Mar 26 17:38:45 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1257: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 23191 at Mon Mar 26 17:38:46 EDT 2012 kill -USR1 23191 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23191 killed at Mon Mar 26 17:38:46 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:38:46 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:46 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23248 >/dev/null 2>/dev/null selfserv_9280 with PID 23248 found at Mon Mar 26 17:38:46 EDT 2012 selfserv_9280 with PID 23248 started at Mon Mar 26 17:38:46 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1258: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 23248 at Mon Mar 26 17:38:46 EDT 2012 kill -USR1 23248 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23248 killed at Mon Mar 26 17:38:46 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:46 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:46 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23305 >/dev/null 2>/dev/null selfserv_9280 with PID 23305 found at Mon Mar 26 17:38:46 EDT 2012 selfserv_9280 with PID 23305 started at Mon Mar 26 17:38:46 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1259: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 23305 at Mon Mar 26 17:38:46 EDT 2012 kill -USR1 23305 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23305 killed at Mon Mar 26 17:38:46 EDT 2012 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:46 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:46 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23368 >/dev/null 2>/dev/null selfserv_9280 with PID 23368 found at Mon Mar 26 17:38:46 EDT 2012 selfserv_9280 with PID 23368 started at Mon Mar 26 17:38:46 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1260: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 23368 at Mon Mar 26 17:38:46 EDT 2012 kill -USR1 23368 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23368 killed at Mon Mar 26 17:38:46 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:38:46 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:46 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23425 >/dev/null 2>/dev/null selfserv_9280 with PID 23425 found at Mon Mar 26 17:38:49 EDT 2012 selfserv_9280 with PID 23425 started at Mon Mar 26 17:38:49 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1261: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 23425 at Mon Mar 26 17:38:49 EDT 2012 kill -USR1 23425 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23425 killed at Mon Mar 26 17:38:49 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:49 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:49 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23482 >/dev/null 2>/dev/null selfserv_9280 with PID 23482 found at Mon Mar 26 17:38:49 EDT 2012 selfserv_9280 with PID 23482 started at Mon Mar 26 17:38:49 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1262: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 23482 at Mon Mar 26 17:38:49 EDT 2012 kill -USR1 23482 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23482 killed at Mon Mar 26 17:38:50 EDT 2012 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:50 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:50 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23545 >/dev/null 2>/dev/null selfserv_9280 with PID 23545 found at Mon Mar 26 17:38:50 EDT 2012 selfserv_9280 with PID 23545 started at Mon Mar 26 17:38:50 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1263: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 23545 at Mon Mar 26 17:38:50 EDT 2012 kill -USR1 23545 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23545 killed at Mon Mar 26 17:38:50 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:38:50 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:50 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23602 >/dev/null 2>/dev/null selfserv_9280 with PID 23602 found at Mon Mar 26 17:38:50 EDT 2012 selfserv_9280 with PID 23602 started at Mon Mar 26 17:38:50 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1264: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 23602 at Mon Mar 26 17:38:50 EDT 2012 kill -USR1 23602 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23602 killed at Mon Mar 26 17:38:50 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:50 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:50 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23659 >/dev/null 2>/dev/null selfserv_9280 with PID 23659 found at Mon Mar 26 17:38:50 EDT 2012 selfserv_9280 with PID 23659 started at Mon Mar 26 17:38:50 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1265: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 23659 at Mon Mar 26 17:38:50 EDT 2012 kill -USR1 23659 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23659 killed at Mon Mar 26 17:38:50 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: TLS Server hello response without SNI ---- selfserv_9280 starting at Mon Mar 26 17:38:50 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:50 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:38:50 EDT 2012 selfserv_9280 with PID 23784 started at Mon Mar 26 17:38:50 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1266: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 23784 at Mon Mar 26 17:38:50 EDT 2012 kill -USR1 23784 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23784 killed at Mon Mar 26 17:38:50 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9280 starting at Mon Mar 26 17:38:50 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:50 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23847 >/dev/null 2>/dev/null selfserv_9280 with PID 23847 found at Mon Mar 26 17:38:50 EDT 2012 selfserv_9280 with PID 23847 started at Mon Mar 26 17:38:50 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1267: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 23847 at Mon Mar 26 17:38:51 EDT 2012 kill -USR1 23847 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23847 killed at Mon Mar 26 17:38:51 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9280 starting at Mon Mar 26 17:38:51 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:51 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23910 >/dev/null 2>/dev/null selfserv_9280 with PID 23910 found at Mon Mar 26 17:38:51 EDT 2012 selfserv_9280 with PID 23910 started at Mon Mar 26 17:38:51 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #1268: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 23910 at Mon Mar 26 17:38:51 EDT 2012 kill -USR1 23910 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23910 killed at Mon Mar 26 17:38:51 EDT 2012 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9280 starting at Mon Mar 26 17:38:51 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:51 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23973 >/dev/null 2>/dev/null selfserv_9280 with PID 23973 found at Mon Mar 26 17:38:51 EDT 2012 selfserv_9280 with PID 23973 started at Mon Mar 26 17:38:51 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1269: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 23973 at Mon Mar 26 17:38:51 EDT 2012 kill -USR1 23973 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23973 killed at Mon Mar 26 17:38:51 EDT 2012 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9280 starting at Mon Mar 26 17:38:51 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:51 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24036 >/dev/null 2>/dev/null selfserv_9280 with PID 24036 found at Mon Mar 26 17:38:51 EDT 2012 selfserv_9280 with PID 24036 started at Mon Mar 26 17:38:51 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #1270: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 24036 at Mon Mar 26 17:38:51 EDT 2012 kill -USR1 24036 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24036 killed at Mon Mar 26 17:38:51 EDT 2012 ssl.sh: TLS Server hello response without SNI ---- selfserv_9280 starting at Mon Mar 26 17:38:51 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:51 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24099 >/dev/null 2>/dev/null selfserv_9280 with PID 24099 found at Mon Mar 26 17:38:51 EDT 2012 selfserv_9280 with PID 24099 started at Mon Mar 26 17:38:51 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1271: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 24099 at Mon Mar 26 17:38:51 EDT 2012 kill -USR1 24099 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24099 killed at Mon Mar 26 17:38:51 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9280 starting at Mon Mar 26 17:38:51 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:51 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24162 >/dev/null 2>/dev/null selfserv_9280 with PID 24162 found at Mon Mar 26 17:38:51 EDT 2012 selfserv_9280 with PID 24162 started at Mon Mar 26 17:38:51 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1272: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 24162 at Mon Mar 26 17:38:52 EDT 2012 kill -USR1 24162 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24162 killed at Mon Mar 26 17:38:52 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9280 starting at Mon Mar 26 17:38:52 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:52 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24225 >/dev/null 2>/dev/null selfserv_9280 with PID 24225 found at Mon Mar 26 17:38:52 EDT 2012 selfserv_9280 with PID 24225 started at Mon Mar 26 17:38:52 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #1273: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 24225 at Mon Mar 26 17:38:52 EDT 2012 kill -USR1 24225 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24225 killed at Mon Mar 26 17:38:52 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9280 starting at Mon Mar 26 17:38:52 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:52 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24288 >/dev/null 2>/dev/null selfserv_9280 with PID 24288 found at Mon Mar 26 17:38:52 EDT 2012 selfserv_9280 with PID 24288 started at Mon Mar 26 17:38:52 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #1274: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 24288 at Mon Mar 26 17:38:52 EDT 2012 kill -USR1 24288 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24288 killed at Mon Mar 26 17:38:52 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9280 starting at Mon Mar 26 17:38:52 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:52 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24351 >/dev/null 2>/dev/null selfserv_9280 with PID 24351 found at Mon Mar 26 17:38:52 EDT 2012 selfserv_9280 with PID 24351 started at Mon Mar 26 17:38:52 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #1275: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 24351 at Mon Mar 26 17:38:52 EDT 2012 kill -USR1 24351 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24351 killed at Mon Mar 26 17:38:52 EDT 2012 ssl.sh: SSL Stress Test - server normal/client fips =============================== ssl.sh: skipping BLOCK ***** (non-FIPS only) ssl.sh: skipping 2.0/LGPL 2.1 (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping this file are subject to the Mozilla Public License Version (non-FIPS only) ssl.sh: skipping you may not use this file except in compliance with (non-FIPS only) ssl.sh: skipping may obtain a copy of the License at (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the License is distributed on an "AS IS" basis, (non-FIPS only) ssl.sh: skipping ANY KIND, either express or implied. See the License (non-FIPS only) ssl.sh: skipping language governing rights and limitations under the (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping is the Netscape security libraries. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping of the Original Code is (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the Initial Developer are Copyright (C) 1994-2009 (non-FIPS only) ssl.sh: skipping All Rights Reserved. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping of this file may be used under the terms of (non-FIPS only) ssl.sh: skipping General Public License Version 2 or later (the "GPL"), or (non-FIPS only) ssl.sh: skipping General Public License Version 2.1 or later (the "LGPL"), (non-FIPS only) ssl.sh: skipping the provisions of the GPL or the LGPL are applicable instead (non-FIPS only) ssl.sh: skipping If you wish to allow use of your version of this file only (non-FIPS only) ssl.sh: skipping of either the GPL or the LGPL, and not to allow others to (non-FIPS only) ssl.sh: skipping of this file under the terms of the MPL, indicate your (non-FIPS only) ssl.sh: skipping the provisions above and replace them with the notice (non-FIPS only) ssl.sh: skipping required by the GPL or the LGPL. If you do not delete# the provisions above, a recipient may use your version of this file under (non-FIPS only) ssl.sh: skipping any one of the MPL, the GPL or the LGPL. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping BLOCK ***** (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping client Test Case name (non-FIPS only) ssl.sh: skipping params (non-FIPS only) ssl.sh: skipping ------ --------------- (non-FIPS only) ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:53 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:53 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24629 >/dev/null 2>/dev/null selfserv_9280 with PID 24629 found at Mon Mar 26 17:38:53 EDT 2012 selfserv_9280 with PID 24629 started at Mon Mar 26 17:38:53 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:53 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:38:53 EDT 2012 ssl.sh: #1276: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 24629 at Mon Mar 26 17:38:53 EDT 2012 kill -USR1 24629 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24629 killed at Mon Mar 26 17:38:53 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:53 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:53 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24704 >/dev/null 2>/dev/null selfserv_9280 with PID 24704 found at Mon Mar 26 17:38:53 EDT 2012 selfserv_9280 with PID 24704 started at Mon Mar 26 17:38:53 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:53 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:38:54 EDT 2012 ssl.sh: #1277: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 24704 at Mon Mar 26 17:38:54 EDT 2012 kill -USR1 24704 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24704 killed at Mon Mar 26 17:38:54 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:54 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:54 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24779 >/dev/null 2>/dev/null selfserv_9280 with PID 24779 found at Mon Mar 26 17:38:54 EDT 2012 selfserv_9280 with PID 24779 started at Mon Mar 26 17:38:54 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:54 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:38:54 EDT 2012 ssl.sh: #1278: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 24779 at Mon Mar 26 17:38:54 EDT 2012 kill -USR1 24779 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24779 killed at Mon Mar 26 17:38:54 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:54 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:54 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24855 >/dev/null 2>/dev/null selfserv_9280 with PID 24855 found at Mon Mar 26 17:38:54 EDT 2012 selfserv_9280 with PID 24855 started at Mon Mar 26 17:38:54 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:54 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:38:55 EDT 2012 ssl.sh: #1279: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 24855 at Mon Mar 26 17:38:55 EDT 2012 kill -USR1 24855 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24855 killed at Mon Mar 26 17:38:55 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:38:55 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:55 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24931 >/dev/null 2>/dev/null selfserv_9280 with PID 24931 found at Mon Mar 26 17:38:55 EDT 2012 selfserv_9280 with PID 24931 started at Mon Mar 26 17:38:55 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:55 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:38:55 EDT 2012 ssl.sh: #1280: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 24931 at Mon Mar 26 17:38:55 EDT 2012 kill -USR1 24931 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24931 killed at Mon Mar 26 17:38:55 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:38:55 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:55 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25007 >/dev/null 2>/dev/null selfserv_9280 with PID 25007 found at Mon Mar 26 17:38:55 EDT 2012 selfserv_9280 with PID 25007 started at Mon Mar 26 17:38:55 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:55 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:38:55 EDT 2012 ssl.sh: #1281: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 25007 at Mon Mar 26 17:38:55 EDT 2012 kill -USR1 25007 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25007 killed at Mon Mar 26 17:38:55 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:38:55 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:55 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25083 >/dev/null 2>/dev/null selfserv_9280 with PID 25083 found at Mon Mar 26 17:38:55 EDT 2012 selfserv_9280 with PID 25083 started at Mon Mar 26 17:38:55 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:55 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:38:56 EDT 2012 ssl.sh: #1282: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 25083 at Mon Mar 26 17:38:56 EDT 2012 kill -USR1 25083 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25083 killed at Mon Mar 26 17:38:56 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9280 starting at Mon Mar 26 17:38:56 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25165 >/dev/null 2>/dev/null selfserv_9280 with PID 25165 found at Mon Mar 26 17:38:56 EDT 2012 selfserv_9280 with PID 25165 started at Mon Mar 26 17:38:56 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:56 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:38:56 EDT 2012 ssl.sh: #1283: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 25165 at Mon Mar 26 17:38:56 EDT 2012 kill -USR1 25165 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25165 killed at Mon Mar 26 17:38:56 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9280 starting at Mon Mar 26 17:38:57 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25247 >/dev/null 2>/dev/null selfserv_9280 with PID 25247 found at Mon Mar 26 17:38:57 EDT 2012 selfserv_9280 with PID 25247 started at Mon Mar 26 17:38:57 EDT 2012 strsclnt -q -p 9280 -d ../client -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Mar 26 17:38:57 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:38:57 EDT 2012 ssl.sh: #1284: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 25247 at Mon Mar 26 17:38:57 EDT 2012 kill -USR1 25247 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25247 killed at Mon Mar 26 17:38:57 EDT 2012 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9280 starting at Mon Mar 26 17:38:58 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:38:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:38:58 EDT 2012 selfserv_9280 with PID 25382 started at Mon Mar 26 17:38:58 EDT 2012 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:38:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:38:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:38:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:38:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:38:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:38:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:38:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:38:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:38:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:38:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -T -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:39:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:39:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:39:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:39:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:39:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:39:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:39:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:39:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:39:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 25382 >/dev/null 2>/dev/null selfserv_9280 with PID 25382 found at Mon Mar 26 17:39:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9280 with PID 25382 at Mon Mar 26 17:39:01 EDT 2012 kill -USR1 25382 selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25382 killed at Mon Mar 26 17:39:01 EDT 2012 ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:39:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26704 >/dev/null 2>/dev/null selfserv_9280 with PID 26704 found at Mon Mar 26 17:39:02 EDT 2012 selfserv_9280 with PID 26704 started at Mon Mar 26 17:39:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1305: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 26704 at Mon Mar 26 17:39:02 EDT 2012 kill -USR1 26704 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26704 killed at Mon Mar 26 17:39:02 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:39:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26761 >/dev/null 2>/dev/null selfserv_9280 with PID 26761 found at Mon Mar 26 17:39:02 EDT 2012 selfserv_9280 with PID 26761 started at Mon Mar 26 17:39:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook Incorrect password/PIN entered. tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #1306: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 26761 at Mon Mar 26 17:39:04 EDT 2012 kill -USR1 26761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26761 killed at Mon Mar 26 17:39:04 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:39:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26818 >/dev/null 2>/dev/null selfserv_9280 with PID 26818 found at Mon Mar 26 17:39:04 EDT 2012 selfserv_9280 with PID 26818 started at Mon Mar 26 17:39:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 26818 at Mon Mar 26 17:39:05 EDT 2012 kill -USR1 26818 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26818 killed at Mon Mar 26 17:39:05 EDT 2012 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:39:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26881 >/dev/null 2>/dev/null selfserv_9280 with PID 26881 found at Mon Mar 26 17:39:05 EDT 2012 selfserv_9280 with PID 26881 started at Mon Mar 26 17:39:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1308: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 26881 at Mon Mar 26 17:39:05 EDT 2012 kill -USR1 26881 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26881 killed at Mon Mar 26 17:39:05 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:39:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26938 >/dev/null 2>/dev/null selfserv_9280 with PID 26938 found at Mon Mar 26 17:39:05 EDT 2012 selfserv_9280 with PID 26938 started at Mon Mar 26 17:39:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation. tstclnt: exiting with return code 254 ssl.sh: #1309: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 26938 at Mon Mar 26 17:39:08 EDT 2012 kill -USR1 26938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26938 killed at Mon Mar 26 17:39:08 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:39:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26995 >/dev/null 2>/dev/null selfserv_9280 with PID 26995 found at Mon Mar 26 17:39:08 EDT 2012 selfserv_9280 with PID 26995 started at Mon Mar 26 17:39:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 26995 at Mon Mar 26 17:39:09 EDT 2012 kill -USR1 26995 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26995 killed at Mon Mar 26 17:39:09 EDT 2012 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:39:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27058 >/dev/null 2>/dev/null selfserv_9280 with PID 27058 found at Mon Mar 26 17:39:09 EDT 2012 selfserv_9280 with PID 27058 started at Mon Mar 26 17:39:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1311: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27058 at Mon Mar 26 17:39:09 EDT 2012 kill -USR1 27058 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27058 killed at Mon Mar 26 17:39:09 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:39:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27115 >/dev/null 2>/dev/null selfserv_9280 with PID 27115 found at Mon Mar 26 17:39:09 EDT 2012 selfserv_9280 with PID 27115 started at Mon Mar 26 17:39:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation. tstclnt: exiting with return code 254 ssl.sh: #1312: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27115 at Mon Mar 26 17:39:11 EDT 2012 kill -USR1 27115 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27115 killed at Mon Mar 26 17:39:11 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:39:11 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27172 >/dev/null 2>/dev/null selfserv_9280 with PID 27172 found at Mon Mar 26 17:39:11 EDT 2012 selfserv_9280 with PID 27172 started at Mon Mar 26 17:39:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27172 at Mon Mar 26 17:39:11 EDT 2012 kill -USR1 27172 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27172 killed at Mon Mar 26 17:39:12 EDT 2012 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:39:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27235 >/dev/null 2>/dev/null selfserv_9280 with PID 27235 found at Mon Mar 26 17:39:12 EDT 2012 selfserv_9280 with PID 27235 started at Mon Mar 26 17:39:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1314: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27235 at Mon Mar 26 17:39:12 EDT 2012 kill -USR1 27235 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27235 killed at Mon Mar 26 17:39:12 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:39:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27292 >/dev/null 2>/dev/null selfserv_9280 with PID 27292 found at Mon Mar 26 17:39:12 EDT 2012 selfserv_9280 with PID 27292 started at Mon Mar 26 17:39:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation. tstclnt: exiting with return code 254 ssl.sh: #1315: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27292 at Mon Mar 26 17:39:14 EDT 2012 kill -USR1 27292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27292 killed at Mon Mar 26 17:39:14 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:39:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27349 >/dev/null 2>/dev/null selfserv_9280 with PID 27349 found at Mon Mar 26 17:39:14 EDT 2012 selfserv_9280 with PID 27349 started at Mon Mar 26 17:39:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27349 at Mon Mar 26 17:39:14 EDT 2012 kill -USR1 27349 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27349 killed at Mon Mar 26 17:39:14 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Stress Test Extended Test - server normal/client fips =============================== ssl.sh: skipping BLOCK ***** (non-FIPS only) ssl.sh: skipping 2.0/LGPL 2.1 (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping this file are subject to the Mozilla Public License Version (non-FIPS only) ssl.sh: skipping you may not use this file except in compliance with (non-FIPS only) ssl.sh: skipping may obtain a copy of the License at (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the License is distributed on an "AS IS" basis, (non-FIPS only) ssl.sh: skipping ANY KIND, either express or implied. See the License (non-FIPS only) ssl.sh: skipping language governing rights and limitations under the (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping is the Netscape security libraries. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping of the Original Code is (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the Initial Developer are Copyright (C) 1994-2009 (non-FIPS only) ssl.sh: skipping All Rights Reserved. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping of this file may be used under the terms of (non-FIPS only) ssl.sh: skipping General Public License Version 2 or later (the "GPL"), or (non-FIPS only) ssl.sh: skipping General Public License Version 2.1 or later (the "LGPL"), (non-FIPS only) ssl.sh: skipping the provisions of the GPL or the LGPL are applicable instead (non-FIPS only) ssl.sh: skipping If you wish to allow use of your version of this file only (non-FIPS only) ssl.sh: skipping of either the GPL or the LGPL, and not to allow others to (non-FIPS only) ssl.sh: skipping of this file under the terms of the MPL, indicate your (non-FIPS only) ssl.sh: skipping the provisions above and replace them with the notice (non-FIPS only) ssl.sh: skipping required by the GPL or the LGPL. If you do not delete# the provisions above, a recipient may use your version of this file under (non-FIPS only) ssl.sh: skipping any one of the MPL, the GPL or the LGPL. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping BLOCK ***** (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping client Test Case name (non-FIPS only) ssl.sh: skipping params (non-FIPS only) ssl.sh: skipping ------ --------------- (non-FIPS only) ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:39:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27709 >/dev/null 2>/dev/null selfserv_9280 with PID 27709 found at Mon Mar 26 17:39:15 EDT 2012 selfserv_9280 with PID 27709 started at Mon Mar 26 17:39:15 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:39:15 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:39:16 EDT 2012 ssl.sh: #1317: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 27709 at Mon Mar 26 17:39:16 EDT 2012 kill -USR1 27709 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27709 killed at Mon Mar 26 17:39:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:39:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27784 >/dev/null 2>/dev/null selfserv_9280 with PID 27784 found at Mon Mar 26 17:39:16 EDT 2012 selfserv_9280 with PID 27784 started at Mon Mar 26 17:39:16 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:39:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:39:17 EDT 2012 ssl.sh: #1318: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 27784 at Mon Mar 26 17:39:17 EDT 2012 kill -USR1 27784 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27784 killed at Mon Mar 26 17:39:17 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:39:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27859 >/dev/null 2>/dev/null selfserv_9280 with PID 27859 found at Mon Mar 26 17:39:17 EDT 2012 selfserv_9280 with PID 27859 started at Mon Mar 26 17:39:17 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:39:17 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:39:17 EDT 2012 ssl.sh: #1319: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 27859 at Mon Mar 26 17:39:17 EDT 2012 kill -USR1 27859 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27859 killed at Mon Mar 26 17:39:17 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:39:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27935 >/dev/null 2>/dev/null selfserv_9280 with PID 27935 found at Mon Mar 26 17:39:17 EDT 2012 selfserv_9280 with PID 27935 started at Mon Mar 26 17:39:17 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:39:17 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:39:18 EDT 2012 ssl.sh: #1320: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 27935 at Mon Mar 26 17:39:18 EDT 2012 kill -USR1 27935 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27935 killed at Mon Mar 26 17:39:18 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:39:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28011 >/dev/null 2>/dev/null selfserv_9280 with PID 28011 found at Mon Mar 26 17:39:18 EDT 2012 selfserv_9280 with PID 28011 started at Mon Mar 26 17:39:18 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:39:18 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:39:18 EDT 2012 ssl.sh: #1321: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 28011 at Mon Mar 26 17:39:18 EDT 2012 kill -USR1 28011 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28011 killed at Mon Mar 26 17:39:18 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:39:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28087 >/dev/null 2>/dev/null selfserv_9280 with PID 28087 found at Mon Mar 26 17:39:18 EDT 2012 selfserv_9280 with PID 28087 started at Mon Mar 26 17:39:18 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:39:18 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:39:18 EDT 2012 ssl.sh: #1322: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 28087 at Mon Mar 26 17:39:18 EDT 2012 kill -USR1 28087 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28087 killed at Mon Mar 26 17:39:19 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:39:19 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:39:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28163 >/dev/null 2>/dev/null selfserv_9280 with PID 28163 found at Mon Mar 26 17:39:19 EDT 2012 selfserv_9280 with PID 28163 started at Mon Mar 26 17:39:19 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:39:19 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:39:19 EDT 2012 ssl.sh: #1323: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 28163 at Mon Mar 26 17:39:19 EDT 2012 kill -USR1 28163 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28163 killed at Mon Mar 26 17:39:19 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1324: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/ext_client -list ssl.sh: #1325: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1326: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Mon Mar 26 17:39:19 EDT 2012 Running tests for ocsp TIMESTAMP ocsp BEGIN: Mon Mar 26 17:39:19 EDT 2012 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Mon Mar 26 17:39:19 EDT 2012 Running tests for merge TIMESTAMP merge BEGIN: Mon Mar 26 17:39:19 EDT 2012 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v3.30287 -t Test2 -f ../tests.pw merge.sh: #1327: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1328: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1329: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1330: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1331: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1332: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:30 2012 Not After : Sun Mar 26 21:35:30 2017 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:42:9b:31:3f:84:ed:8c:52:19:aa:00:ef:67:a1:ca: 14:d7:ba:40:d3:64:00:4e:a7:2f:03:6a:f1:fc:ad:20: e3:74:d9:b9:8e:65:1c:af:fa:63:fd:88:4f:20:b7:66: 7f:4b:3b:4d:fc:2a:f7:0d:02:27:43:39:db:9a:2b:50: af:c2:05:ed:a4:5a:8e:af:15:16:8a:d9:a5:e0:10:96: 69:0c:f6:4c:97:b7:31:20:1d:b1:e4:74:80:c4:54:65: c3:7c:79:5b:ce:fe:fb:17:fa:b5:69:21:30:c4:32:df: 49:b0:e3:13:fe:0c:83:50:cd:2f:d7:6e:2e:8a:3a:9b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 03:9e:a6:ff:d0:be:ac:2f:d9:78:fc:7d:05:00:ac:b9: 1e:52:6e:8c:50:c0:b7:16:b2:45:34:44:d8:a4:b3:11: 8a:cc:54:46:cb:98:46:99:e6:bf:35:37:d1:50:8f:9c: d1:fc:14:f3:27:a8:2b:02:14:55:64:ce:c8:55:a9:c4: e5:20:86:ac:bf:03:a7:3f:78:25:10:b0:47:e8:de:00: 4c:ef:8f:48:ee:85:2b:ad:9a:8c:3e:70:35:81:a9:ed: 94:53:fb:db:94:e6:1a:49:c0:ab:47:8d:f9:6b:c9:be: 04:86:4f:cb:40:9d:a9:ee:cf:a8:dc:6b:28:0f:55:82 Fingerprint (MD5): 11:02:36:19:2B:AF:7A:B8:FD:4E:B0:95:45:0B:7B:3E Fingerprint (SHA1): 52:87:72:5E:F0:FC:58:81:8C:EC:03:5A:87:7F:F4:A5:87:B4:91:49 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #1333: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:31 2012 Not After : Sun Mar 26 21:35:31 2017 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:24:68:3b:14:43:b0:f9:70:b2:58:c4:10:79:31:b6: 0d:f6:cc:4d:ab:31:5d:b7:4c:fe:8e:0d:f3:4a:af:d6: 58:20:12:00:83:98:7e:5e:4d:52:c7:f5:ba:66:28:e7: ea:cb:03:93:7d:d6:fb:79:2d:e6:1d:ea:1c:ab:d7:1d: 41:b9:0f:b7:0b:60:79:9b:06:8e:d0:ae:2a:3f:f0:31: c6:c5:d2:f8:b1:aa:a9:25:89:ac:63:af:1f:f8:f6:46: 66:ea:12:63:ff:b8:59:65:7a:7a:42:80:23:b7:ec:c4: c9:a5:fb:0f:ad:fd:60:a7:c4:ee:87:77:1a:e4:b4:c1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 55:3b:16:28:a3:6c:aa:19:17:f0:57:c2:bf:50:85:0c: f4:02:f7:06:0f:a5:69:d1:f8:6b:39:78:01:0a:65:f8: eb:7e:b3:e9:9e:10:81:7d:f1:6d:7f:f2:d5:ad:c3:97: 20:d0:00:c9:b7:6f:87:bd:77:b1:86:a1:69:fb:71:b6: ea:06:32:f7:e5:78:66:ee:8c:76:8a:57:0b:63:2e:b3: b3:df:31:4c:a3:b7:1b:b4:d2:55:7d:f1:fe:29:9d:f3: a5:bb:d6:02:01:40:73:12:62:d7:ef:45:26:24:71:a4: e4:6d:f3:ef:32:cb:d8:62:bc:f5:bb:e6:a2:05:62:a4 Fingerprint (MD5): B2:FD:E9:12:92:F7:E5:A3:AE:1F:26:E9:5B:5A:B9:68 Fingerprint (SHA1): BD:0E:28:88:83:67:65:A7:91:89:2A:88:B3:43:BA:E5:B9:D2:83:B2 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #1334: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1335: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI Alice u,u,u bob@bogus.com ,, eve@bogus.com ,, Dave u,u,u localhost.localdomain u,u,u clientCA T,C,C chain-2-clientCA ,, Alice #1 ,, Alice #3 ,, Alice #100 ,, TestCA CT,C,C localhost-sni.localdomain u,u,u ExtendedSSLUser u,u,u serverCA C,C,C chain-1-clientCA ,, Alice #2 ,, Alice #99 ,, Alice #4 ,, CRL names CRL Type TestCA CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v3.30287 -t Test2 -f ../tests.pw merge.sh: #1336: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests.v1.30287 -t Test1 -f ../tests.pw merge.sh: #1337: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #1338: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #1339: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #1340: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Mon Mar 26 21:35:37 2012 Entry (1): Serial Number: 40 (0x28) Revocation Date: Mon Mar 26 21:35:15 2012 Entry Extensions: Name: CRL reason code Entry (2): Serial Number: 42 (0x2a) Revocation Date: Mon Mar 26 21:35:35 2012 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #1341: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Mon Mar 26 17:39:20 EDT 2012 Running tests for pkits TIMESTAMP pkits BEGIN: Mon Mar 26 17:39:20 EDT 2012 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Mon Mar 26 17:39:20 EDT 2012 Running tests for chains TIMESTAMP chains BEGIN: Mon Mar 26 17:39:20 EDT 2012 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1342: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326173921 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1343: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1344: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1345: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326173922 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1346: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1347: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1348: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1349: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326173923 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1350: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #1351: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326173924 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1352: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #1353: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1354: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1355: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1356: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 326173925 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1357: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der chains.sh: #1358: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1359: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1360: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1361: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173922 (0x137104e2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:39:21 2012 Not After : Sun Mar 26 21:39:21 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:62:1a:55:58:1b:dd:60:bb:44:67:8c:2a:f9:ea:4d: 4d:3e:0a:c2:02:fb:06:5b:f3:ee:6e:13:8f:fb:d5:17: f4:66:91:fc:35:95:5d:a0:12:b5:6a:a3:d2:c2:bc:b6: 58:16:3a:37:33:58:04:f9:0d:d9:6a:4e:0f:d6:ba:f0: a5:6d:13:05:e1:b8:e9:9e:2b:28:bc:40:39:90:72:c5: 3d:ce:fa:1e:00:f3:31:76:ef:99:d5:c9:b7:9a:c1:04: 90:42:c0:37:c0:58:a8:32:95:60:1d:75:fd:99:e3:bc: 3a:b3:36:9c:58:b2:d0:38:db:bf:6c:32:25:2e:94:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 48:cc:d5:3f:df:48:ef:20:05:35:ed:35:21:03:96:43: cc:1e:2a:e6:58:5e:c0:72:21:d1:f7:02:6c:1d:9d:49: 85:60:af:50:ac:2f:4c:ae:af:a3:53:a8:7d:37:58:2e: 62:52:22:3f:4a:0c:97:b2:5c:a8:09:f2:c8:22:97:1d: a6:e3:6d:23:d8:c6:65:b3:e5:be:14:59:68:fd:60:a7: 3c:a4:c8:43:60:ae:dd:cc:e7:20:9c:52:c3:8f:51:b0: 10:56:f0:47:0c:05:bc:02:1d:92:b0:63:0b:f6:80:ff: 5d:e7:b8:b0:2d:83:cc:a8:cb:71:f4:ef:67:ea:37:5f Fingerprint (MD5): 82:31:9A:B9:40:13:27:18:C5:7C:28:A9:6A:98:EF:84 Fingerprint (SHA1): AD:39:EF:6A:FD:EB:A9:22:D4:76:2B:F1:96:EA:8C:F6:F3:E3:14:34 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1362: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173921 (0x137104e1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:39:20 2012 Not After : Sun Mar 26 21:39:20 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:62:7c:4c:4b:09:0a:bc:6d:28:9b:cf:e0:da:5b:5b: ca:05:90:f9:f1:19:d1:f1:0f:95:dd:6d:fa:fd:bb:f3: f4:84:27:b2:45:c7:13:c0:eb:d4:b0:c9:73:44:6c:4f: e8:a9:d8:02:66:ff:ac:29:ba:6e:76:38:55:ff:63:68: c7:00:24:b6:eb:5f:e5:f8:43:ba:de:a6:f6:91:5d:a2: e2:6c:e5:c3:66:2c:89:05:cb:98:64:24:d8:9f:8a:d0: 96:44:2c:b0:3e:1d:6c:86:40:b1:79:ab:bd:74:c8:90: 1e:ab:41:4d:b1:f1:1f:ce:a7:0c:dd:d4:2d:22:3c:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:94:bd:ee:a0:04:c8:1f:73:1d:a4:62:1b:55:55:fb: 05:77:b3:82:d7:ea:f9:0e:e4:45:7f:91:b6:f8:d8:f3: 26:e2:de:54:eb:a0:c5:ab:62:4c:47:09:1e:61:c1:41: fc:a6:5a:36:89:08:fb:e7:51:96:a9:09:ca:b9:22:09: 8f:a1:ec:b1:aa:d4:96:70:0b:e1:74:27:0d:83:a9:d3: a0:41:cd:46:a1:50:ca:2e:18:71:1e:05:14:71:a9:da: 07:ab:9e:81:46:8f:45:e7:72:dd:cd:0e:b9:db:7c:40: c1:56:b3:fc:bd:34:f0:86:75:db:4e:d8:50:3b:fe:03 Fingerprint (MD5): 6C:41:0A:B5:39:28:D5:5D:22:D4:C3:08:7A:93:29:52 Fingerprint (SHA1): 50:95:9E:E5:0F:6A:80:D8:3A:B2:10:BF:C6:66:43:81:7F:25:88:2D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1363: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1364: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1365: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1366: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173921 (0x137104e1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:39:20 2012 Not After : Sun Mar 26 21:39:20 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:62:7c:4c:4b:09:0a:bc:6d:28:9b:cf:e0:da:5b:5b: ca:05:90:f9:f1:19:d1:f1:0f:95:dd:6d:fa:fd:bb:f3: f4:84:27:b2:45:c7:13:c0:eb:d4:b0:c9:73:44:6c:4f: e8:a9:d8:02:66:ff:ac:29:ba:6e:76:38:55:ff:63:68: c7:00:24:b6:eb:5f:e5:f8:43:ba:de:a6:f6:91:5d:a2: e2:6c:e5:c3:66:2c:89:05:cb:98:64:24:d8:9f:8a:d0: 96:44:2c:b0:3e:1d:6c:86:40:b1:79:ab:bd:74:c8:90: 1e:ab:41:4d:b1:f1:1f:ce:a7:0c:dd:d4:2d:22:3c:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:94:bd:ee:a0:04:c8:1f:73:1d:a4:62:1b:55:55:fb: 05:77:b3:82:d7:ea:f9:0e:e4:45:7f:91:b6:f8:d8:f3: 26:e2:de:54:eb:a0:c5:ab:62:4c:47:09:1e:61:c1:41: fc:a6:5a:36:89:08:fb:e7:51:96:a9:09:ca:b9:22:09: 8f:a1:ec:b1:aa:d4:96:70:0b:e1:74:27:0d:83:a9:d3: a0:41:cd:46:a1:50:ca:2e:18:71:1e:05:14:71:a9:da: 07:ab:9e:81:46:8f:45:e7:72:dd:cd:0e:b9:db:7c:40: c1:56:b3:fc:bd:34:f0:86:75:db:4e:d8:50:3b:fe:03 Fingerprint (MD5): 6C:41:0A:B5:39:28:D5:5D:22:D4:C3:08:7A:93:29:52 Fingerprint (SHA1): 50:95:9E:E5:0F:6A:80:D8:3A:B2:10:BF:C6:66:43:81:7F:25:88:2D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1367: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173922 (0x137104e2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:39:21 2012 Not After : Sun Mar 26 21:39:21 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:62:1a:55:58:1b:dd:60:bb:44:67:8c:2a:f9:ea:4d: 4d:3e:0a:c2:02:fb:06:5b:f3:ee:6e:13:8f:fb:d5:17: f4:66:91:fc:35:95:5d:a0:12:b5:6a:a3:d2:c2:bc:b6: 58:16:3a:37:33:58:04:f9:0d:d9:6a:4e:0f:d6:ba:f0: a5:6d:13:05:e1:b8:e9:9e:2b:28:bc:40:39:90:72:c5: 3d:ce:fa:1e:00:f3:31:76:ef:99:d5:c9:b7:9a:c1:04: 90:42:c0:37:c0:58:a8:32:95:60:1d:75:fd:99:e3:bc: 3a:b3:36:9c:58:b2:d0:38:db:bf:6c:32:25:2e:94:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 48:cc:d5:3f:df:48:ef:20:05:35:ed:35:21:03:96:43: cc:1e:2a:e6:58:5e:c0:72:21:d1:f7:02:6c:1d:9d:49: 85:60:af:50:ac:2f:4c:ae:af:a3:53:a8:7d:37:58:2e: 62:52:22:3f:4a:0c:97:b2:5c:a8:09:f2:c8:22:97:1d: a6:e3:6d:23:d8:c6:65:b3:e5:be:14:59:68:fd:60:a7: 3c:a4:c8:43:60:ae:dd:cc:e7:20:9c:52:c3:8f:51:b0: 10:56:f0:47:0c:05:bc:02:1d:92:b0:63:0b:f6:80:ff: 5d:e7:b8:b0:2d:83:cc:a8:cb:71:f4:ef:67:ea:37:5f Fingerprint (MD5): 82:31:9A:B9:40:13:27:18:C5:7C:28:A9:6A:98:EF:84 Fingerprint (SHA1): AD:39:EF:6A:FD:EB:A9:22:D4:76:2B:F1:96:EA:8C:F6:F3:E3:14:34 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1368: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1369: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1370: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1371: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1372: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1373: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173922 (0x137104e2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:39:21 2012 Not After : Sun Mar 26 21:39:21 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:62:1a:55:58:1b:dd:60:bb:44:67:8c:2a:f9:ea:4d: 4d:3e:0a:c2:02:fb:06:5b:f3:ee:6e:13:8f:fb:d5:17: f4:66:91:fc:35:95:5d:a0:12:b5:6a:a3:d2:c2:bc:b6: 58:16:3a:37:33:58:04:f9:0d:d9:6a:4e:0f:d6:ba:f0: a5:6d:13:05:e1:b8:e9:9e:2b:28:bc:40:39:90:72:c5: 3d:ce:fa:1e:00:f3:31:76:ef:99:d5:c9:b7:9a:c1:04: 90:42:c0:37:c0:58:a8:32:95:60:1d:75:fd:99:e3:bc: 3a:b3:36:9c:58:b2:d0:38:db:bf:6c:32:25:2e:94:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 48:cc:d5:3f:df:48:ef:20:05:35:ed:35:21:03:96:43: cc:1e:2a:e6:58:5e:c0:72:21:d1:f7:02:6c:1d:9d:49: 85:60:af:50:ac:2f:4c:ae:af:a3:53:a8:7d:37:58:2e: 62:52:22:3f:4a:0c:97:b2:5c:a8:09:f2:c8:22:97:1d: a6:e3:6d:23:d8:c6:65:b3:e5:be:14:59:68:fd:60:a7: 3c:a4:c8:43:60:ae:dd:cc:e7:20:9c:52:c3:8f:51:b0: 10:56:f0:47:0c:05:bc:02:1d:92:b0:63:0b:f6:80:ff: 5d:e7:b8:b0:2d:83:cc:a8:cb:71:f4:ef:67:ea:37:5f Fingerprint (MD5): 82:31:9A:B9:40:13:27:18:C5:7C:28:A9:6A:98:EF:84 Fingerprint (SHA1): AD:39:EF:6A:FD:EB:A9:22:D4:76:2B:F1:96:EA:8C:F6:F3:E3:14:34 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1374: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173922 (0x137104e2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:39:21 2012 Not After : Sun Mar 26 21:39:21 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:62:1a:55:58:1b:dd:60:bb:44:67:8c:2a:f9:ea:4d: 4d:3e:0a:c2:02:fb:06:5b:f3:ee:6e:13:8f:fb:d5:17: f4:66:91:fc:35:95:5d:a0:12:b5:6a:a3:d2:c2:bc:b6: 58:16:3a:37:33:58:04:f9:0d:d9:6a:4e:0f:d6:ba:f0: a5:6d:13:05:e1:b8:e9:9e:2b:28:bc:40:39:90:72:c5: 3d:ce:fa:1e:00:f3:31:76:ef:99:d5:c9:b7:9a:c1:04: 90:42:c0:37:c0:58:a8:32:95:60:1d:75:fd:99:e3:bc: 3a:b3:36:9c:58:b2:d0:38:db:bf:6c:32:25:2e:94:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 48:cc:d5:3f:df:48:ef:20:05:35:ed:35:21:03:96:43: cc:1e:2a:e6:58:5e:c0:72:21:d1:f7:02:6c:1d:9d:49: 85:60:af:50:ac:2f:4c:ae:af:a3:53:a8:7d:37:58:2e: 62:52:22:3f:4a:0c:97:b2:5c:a8:09:f2:c8:22:97:1d: a6:e3:6d:23:d8:c6:65:b3:e5:be:14:59:68:fd:60:a7: 3c:a4:c8:43:60:ae:dd:cc:e7:20:9c:52:c3:8f:51:b0: 10:56:f0:47:0c:05:bc:02:1d:92:b0:63:0b:f6:80:ff: 5d:e7:b8:b0:2d:83:cc:a8:cb:71:f4:ef:67:ea:37:5f Fingerprint (MD5): 82:31:9A:B9:40:13:27:18:C5:7C:28:A9:6A:98:EF:84 Fingerprint (SHA1): AD:39:EF:6A:FD:EB:A9:22:D4:76:2B:F1:96:EA:8C:F6:F3:E3:14:34 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1375: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1376: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1377: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1378: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1379: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1380: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173921 (0x137104e1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:39:20 2012 Not After : Sun Mar 26 21:39:20 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:62:7c:4c:4b:09:0a:bc:6d:28:9b:cf:e0:da:5b:5b: ca:05:90:f9:f1:19:d1:f1:0f:95:dd:6d:fa:fd:bb:f3: f4:84:27:b2:45:c7:13:c0:eb:d4:b0:c9:73:44:6c:4f: e8:a9:d8:02:66:ff:ac:29:ba:6e:76:38:55:ff:63:68: c7:00:24:b6:eb:5f:e5:f8:43:ba:de:a6:f6:91:5d:a2: e2:6c:e5:c3:66:2c:89:05:cb:98:64:24:d8:9f:8a:d0: 96:44:2c:b0:3e:1d:6c:86:40:b1:79:ab:bd:74:c8:90: 1e:ab:41:4d:b1:f1:1f:ce:a7:0c:dd:d4:2d:22:3c:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:94:bd:ee:a0:04:c8:1f:73:1d:a4:62:1b:55:55:fb: 05:77:b3:82:d7:ea:f9:0e:e4:45:7f:91:b6:f8:d8:f3: 26:e2:de:54:eb:a0:c5:ab:62:4c:47:09:1e:61:c1:41: fc:a6:5a:36:89:08:fb:e7:51:96:a9:09:ca:b9:22:09: 8f:a1:ec:b1:aa:d4:96:70:0b:e1:74:27:0d:83:a9:d3: a0:41:cd:46:a1:50:ca:2e:18:71:1e:05:14:71:a9:da: 07:ab:9e:81:46:8f:45:e7:72:dd:cd:0e:b9:db:7c:40: c1:56:b3:fc:bd:34:f0:86:75:db:4e:d8:50:3b:fe:03 Fingerprint (MD5): 6C:41:0A:B5:39:28:D5:5D:22:D4:C3:08:7A:93:29:52 Fingerprint (SHA1): 50:95:9E:E5:0F:6A:80:D8:3A:B2:10:BF:C6:66:43:81:7F:25:88:2D Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1381: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173921 (0x137104e1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:39:20 2012 Not After : Sun Mar 26 21:39:20 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:62:7c:4c:4b:09:0a:bc:6d:28:9b:cf:e0:da:5b:5b: ca:05:90:f9:f1:19:d1:f1:0f:95:dd:6d:fa:fd:bb:f3: f4:84:27:b2:45:c7:13:c0:eb:d4:b0:c9:73:44:6c:4f: e8:a9:d8:02:66:ff:ac:29:ba:6e:76:38:55:ff:63:68: c7:00:24:b6:eb:5f:e5:f8:43:ba:de:a6:f6:91:5d:a2: e2:6c:e5:c3:66:2c:89:05:cb:98:64:24:d8:9f:8a:d0: 96:44:2c:b0:3e:1d:6c:86:40:b1:79:ab:bd:74:c8:90: 1e:ab:41:4d:b1:f1:1f:ce:a7:0c:dd:d4:2d:22:3c:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:94:bd:ee:a0:04:c8:1f:73:1d:a4:62:1b:55:55:fb: 05:77:b3:82:d7:ea:f9:0e:e4:45:7f:91:b6:f8:d8:f3: 26:e2:de:54:eb:a0:c5:ab:62:4c:47:09:1e:61:c1:41: fc:a6:5a:36:89:08:fb:e7:51:96:a9:09:ca:b9:22:09: 8f:a1:ec:b1:aa:d4:96:70:0b:e1:74:27:0d:83:a9:d3: a0:41:cd:46:a1:50:ca:2e:18:71:1e:05:14:71:a9:da: 07:ab:9e:81:46:8f:45:e7:72:dd:cd:0e:b9:db:7c:40: c1:56:b3:fc:bd:34:f0:86:75:db:4e:d8:50:3b:fe:03 Fingerprint (MD5): 6C:41:0A:B5:39:28:D5:5D:22:D4:C3:08:7A:93:29:52 Fingerprint (SHA1): 50:95:9E:E5:0F:6A:80:D8:3A:B2:10:BF:C6:66:43:81:7F:25:88:2D Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1382: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1383: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326173926 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1384: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1385: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1386: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326173927 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1387: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1388: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1389: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326173928 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1390: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1391: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1392: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326173929 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1393: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1394: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1395: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326173930 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1396: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1397: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1398: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326173931 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1399: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1400: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1401: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326173932 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1402: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1403: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1404: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326173933 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1405: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1406: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1407: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326173934 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1408: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1409: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1410: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1411: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 326173935 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1412: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der chains.sh: #1413: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 326173936 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1414: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der chains.sh: #1415: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 326173937 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1416: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der chains.sh: #1417: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1418: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1419: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1420: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 326173938 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1421: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der chains.sh: #1422: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 326173939 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1423: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der chains.sh: #1424: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 326173940 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1425: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der chains.sh: #1426: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1427: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1428: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1429: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 326173941 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1430: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der chains.sh: #1431: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 326173942 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1432: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der chains.sh: #1433: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 326173943 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1434: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der chains.sh: #1435: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1436: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1437: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1438: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 326173944 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1439: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der chains.sh: #1440: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 326173945 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1441: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der chains.sh: #1442: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 326173946 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1443: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der chains.sh: #1444: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1445: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1446: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1447: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 326173947 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1448: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der chains.sh: #1449: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1450: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1451: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326173948 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1452: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #1453: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173926 (0x137104e6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Mar 26 21:39:23 2012 Not After : Sun Mar 26 21:39:23 2062 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:1e:8a:60:23:0d:87:93:3b:e6:10:fe:0d:91:11: 3b:83:72:35:bd:f4:76:70:53:8f:16:00:c9:f1:6b:95: 4e:bf:2f:20:25:f9:2c:8a:25:04:48:2a:6b:c2:8c:02: c7:3c:fd:d0:e9:20:66:b1:37:82:f4:03:4d:0b:ee:df: ab:b1:7c:56:6f:eb:f8:a3:7a:bf:96:ff:8f:48:fb:6a: c9:80:b4:3e:96:15:a3:75:93:fe:92:a8:d2:37:2d:b8: 98:ef:bd:b6:ad:ac:89:2f:e0:57:6c:b7:8e:77:ec:b1: 40:17:59:83:4b:93:98:fa:4d:6a:e1:7e:5f:6a:f8:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a2:d3:a3:a4:f3:b6:13:7e:71:97:2c:b9:aa:45:1f:70: c5:2f:40:27:44:3c:35:48:e8:29:fd:33:cb:7c:34:3f: 88:8e:4d:df:19:3b:9a:18:aa:99:20:d8:9e:9b:88:88: e4:05:d8:fb:1b:8c:ad:a1:44:55:7b:f7:ed:e7:be:10: 21:5f:46:dd:0e:6f:ef:a4:3a:2d:ce:0b:97:5d:ac:44: 1e:99:30:b5:ce:a1:3a:45:73:94:33:f2:f4:0a:ae:28: b0:26:1d:fb:bc:c9:af:47:c0:fa:99:be:e9:2a:f3:23: da:fe:12:63:48:db:56:7a:bd:d1:7d:c2:14:62:67:31 Fingerprint (MD5): C9:C8:07:17:CC:47:DC:32:A8:94:67:60:CD:B3:3C:23 Fingerprint (SHA1): 7C:8A:87:88:08:DF:1B:9B:75:A5:C8:60:07:7B:25:FE:58:85:F3:52 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1454: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173927 (0x137104e7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Mar 26 21:39:24 2012 Not After : Sun Mar 26 21:39:24 2062 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:e5:59:b9:08:4d:47:66:22:59:a4:ce:0e:9c:4b:72: 52:3d:a9:ee:79:8e:f6:2c:78:fe:83:d8:09:2e:0f:3b: 49:78:28:0e:bb:05:32:d6:b1:21:f2:0e:67:f5:d6:ea: ce:c8:f0:d3:b5:3f:3f:30:78:6b:6b:67:9e:f6:ce:3a: 5f:37:36:a5:cd:fa:bf:11:90:08:62:a4:e1:c2:3e:ce: d8:ee:d1:5f:9e:a7:5c:87:d9:95:b1:18:a6:d3:c2:b8: e1:f5:75:f2:25:66:4a:6d:55:32:99:05:58:7f:39:84: ad:a6:29:81:25:61:a4:13:7f:ca:d6:fd:f1:21:e8:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 82:8a:a5:23:7f:d1:88:0e:ee:59:d3:60:73:f3:2d:fa: 1b:8c:1d:0d:37:cd:f1:fc:98:cd:89:11:bd:0c:3d:cc: 17:e8:a5:9c:c5:f3:60:b5:cd:f0:fc:65:fe:99:bd:c3: 3c:38:ef:23:6f:07:23:25:6f:a9:a9:fc:90:f2:0f:5c: 20:ac:c7:1c:8c:4b:f6:95:d2:4f:42:72:80:95:a5:e1: 38:8b:e6:e1:21:02:9e:20:ff:cf:ae:69:7b:f4:15:63: a6:00:d1:da:16:cf:6f:ae:5f:fe:95:72:bf:0e:81:0f: 15:14:dc:6d:0b:39:04:49:65:6e:f6:77:4f:39:01:df Fingerprint (MD5): B3:69:B3:6D:7D:A4:97:8D:F9:E9:14:59:5B:93:7F:E9 Fingerprint (SHA1): A6:29:0A:CD:E6:E6:9F:38:21:7C:A5:86:B8:CB:5A:2E:F0:D7:7E:15 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1455: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173928 (0x137104e8) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Mar 26 21:39:24 2012 Not After : Sun Mar 26 21:39:24 2062 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:54:77:74:95:7b:35:8a:0b:77:4e:44:46:94:cd:df: ed:24:f7:79:6a:72:18:9f:9b:0e:50:3d:c6:2e:5b:01: c7:99:5d:03:8f:3a:07:c1:9c:bd:42:cc:aa:ee:43:7c: 3e:71:e4:ab:9c:9e:b4:0a:d5:6f:0e:bc:e2:33:9d:4a: c3:b0:87:b2:27:af:17:42:91:18:cd:79:ef:de:23:a9: 1d:5e:40:45:9a:ff:5b:4a:3d:96:46:a5:e8:21:31:17: 4c:46:21:23:ce:bb:31:8d:10:ab:4b:3e:75:c6:11:93: 21:de:64:05:2a:d8:e7:f6:2e:a9:a0:7a:b8:65:74:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 57:a7:72:76:30:26:72:62:68:d0:55:ca:98:da:40:51: 7d:04:16:fb:ac:47:dd:7a:57:77:05:a3:ea:a9:f3:7a: 1c:03:21:26:35:dd:c1:80:d8:0c:65:0e:c4:06:a8:76: 42:a1:29:81:b5:83:55:a1:e8:75:a1:4c:15:fa:46:24: d6:00:da:01:d7:39:70:a0:a4:fa:39:19:75:ce:a4:e0: dd:96:26:26:e4:25:b5:3c:42:87:5f:5f:d4:08:8d:44: b4:ab:51:f8:03:df:a1:ff:ee:66:25:6e:fb:f3:43:6f: 96:6f:aa:72:51:31:fb:c6:ba:58:28:82:bc:09:df:e5 Fingerprint (MD5): B2:FD:5A:6E:AC:F2:B2:4A:1E:31:43:17:62:CE:55:BD Fingerprint (SHA1): 79:7E:27:E0:03:87:D3:A4:9F:1E:D4:A2:4D:F5:DC:52:53:8E:1A:EE Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1456: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173929 (0x137104e9) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Mar 26 21:39:24 2012 Not After : Sun Mar 26 21:39:24 2062 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:aa:2b:cc:6c:15:04:5e:35:c1:6a:c2:8b:26:a8:1f: 3c:74:74:de:52:be:83:ee:ad:b1:f8:79:ee:2a:ad:08: b6:e8:d1:20:5a:eb:d0:8a:39:6c:aa:e2:ae:1a:7a:84: 07:37:12:5d:19:0d:2a:25:99:71:d3:d5:3e:0a:d0:39: ee:1f:32:75:6f:23:5d:02:2b:ae:62:41:eb:fb:ed:75: 53:96:47:ed:5f:a4:ff:50:7d:6a:b8:fe:0f:e3:0b:78: 4f:b0:a8:b2:3a:cf:76:b0:1f:0d:e6:81:ac:34:4d:95: 9e:a4:90:28:c5:bf:87:14:1d:a5:dc:d3:50:f3:a2:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 65:2b:fe:8c:a5:69:81:83:65:bb:f3:9d:f3:a5:1e:60: 53:e9:cc:2f:a6:f7:f5:fc:ef:1b:8f:f9:a8:34:70:b5: f7:96:45:fe:dc:31:a7:60:23:e6:e5:55:a5:09:db:5f: 44:2b:76:98:ca:e2:4a:2a:72:de:fe:74:33:ec:3b:bd: ac:14:89:a7:8c:e9:19:42:50:22:0b:9f:e2:3a:27:62: e5:57:b4:13:ba:d8:ee:6f:90:9c:11:89:11:29:a9:05: 65:c7:dc:f4:69:fc:77:c9:4c:c5:b1:02:fe:7c:df:ac: 22:5e:c2:5d:54:02:81:cf:52:d0:b3:0a:f6:9d:3c:4c Fingerprint (MD5): F0:08:2C:8B:72:AC:0E:E0:EE:80:7F:7E:65:95:DE:90 Fingerprint (SHA1): A8:58:B8:92:DA:10:76:35:92:B3:40:FB:3D:F9:59:BA:FF:CE:6E:76 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1457: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173930 (0x137104ea) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Mar 26 21:39:24 2012 Not After : Sun Mar 26 21:39:24 2062 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:72:3b:dd:cc:85:31:b1:00:8c:43:69:dd:0b:cb:27: e4:02:f6:8a:4c:84:82:26:e2:35:bd:6a:3d:b4:99:09: 60:7d:82:24:fc:39:7a:8f:fc:e9:29:07:4f:08:6c:d6: 63:29:d2:f5:8c:4f:1b:a7:cd:7f:8e:03:5d:06:ef:47: 91:11:4f:dc:87:35:34:40:ed:8f:35:eb:7e:dd:ce:44: 65:e0:5a:ef:dd:60:7c:83:ad:d6:68:0b:f6:1a:3f:2f: 48:95:35:bc:d1:f9:3c:fe:18:9b:0d:76:7b:5b:35:43: 63:1c:98:a6:a5:84:7d:69:c9:90:42:f3:8e:42:e1:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1a:b1:8c:6f:8b:39:7b:45:cf:01:c4:3a:9a:e0:38:31: 60:42:e3:ea:a0:c5:0b:f1:85:d5:77:3e:cf:dd:66:6f: 9d:3c:ee:c5:9d:45:3c:f6:3e:46:3b:53:da:fd:4a:7f: 70:be:9c:f5:5a:83:e0:b7:28:1c:00:50:b4:25:54:ac: 06:4a:1d:f9:19:c5:a1:30:6c:7e:13:36:74:7c:28:29: 58:bb:30:91:35:31:86:f6:c1:6e:fd:9d:aa:a2:35:c5: f9:fb:d1:b5:93:78:83:9f:5a:c1:50:f6:74:11:f5:13: fa:39:da:1f:5b:ed:46:56:ce:27:74:17:76:17:dc:c3 Fingerprint (MD5): 77:19:38:CC:83:68:36:4D:9D:77:57:6A:A5:CA:E2:90 Fingerprint (SHA1): 47:EF:3B:DE:E6:81:E0:A0:FD:08:78:3E:AF:36:B9:50:94:B1:46:67 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1458: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173931 (0x137104eb) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Mar 26 21:39:25 2012 Not After : Sun Mar 26 21:39:25 2062 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:0c:c0:27:6b:82:65:6d:53:bd:96:1d:1c:fa:32:86: d6:56:2f:f6:d0:81:03:8f:b4:84:d8:68:68:d6:db:3f: 5d:95:65:ed:1a:84:fe:34:71:e2:9a:fe:3f:4b:d1:0c: 54:ed:63:fb:7c:4b:4f:6a:6c:50:a3:d6:45:2c:8a:eb: 42:9d:77:35:d9:b3:8c:e1:91:e8:eb:b4:c6:6b:29:8b: 1b:c0:6f:6a:0e:2a:74:4e:91:61:57:31:69:e2:20:29: 6f:40:32:aa:2d:a8:26:a5:57:33:1c:ad:50:a6:0b:ea: 27:cb:cb:e9:0e:29:33:cb:1e:49:bb:32:ab:30:6d:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 04:bb:b0:f8:79:7e:4f:82:ce:b4:5e:cf:da:c0:91:14: fe:6e:2b:61:09:7c:4d:39:af:fd:fd:7a:7c:a2:4d:1c: e7:09:1f:8f:39:0b:c8:17:7b:4c:33:be:a8:41:5d:06: 92:00:f3:82:b8:a4:c5:68:00:95:27:3b:a7:b5:06:d2: 32:6e:f9:dc:56:da:39:f9:c5:2e:1d:fb:31:cc:84:a5: 16:fb:6b:be:24:c8:5c:f3:93:60:d6:40:b1:08:8f:82: 7b:cb:11:3b:1f:df:87:64:9c:d5:d1:3d:76:61:75:b9: f2:d7:9a:de:e1:e3:08:4c:97:0f:88:e4:c8:7c:ff:a5 Fingerprint (MD5): 23:23:28:60:28:1E:E9:35:F5:E9:FC:1A:4F:0C:CC:A8 Fingerprint (SHA1): 39:30:D3:21:AF:41:A6:6B:A1:64:9E:70:A5:77:1D:9B:0E:02:0A:EF Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1459: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173932 (0x137104ec) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Mar 26 21:39:25 2012 Not After : Sun Mar 26 21:39:25 2062 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:4c:2c:1c:67:2f:5c:6b:66:a9:6d:b4:6a:94:97:a6: df:64:20:bc:e9:2a:2e:32:3c:83:c7:31:6f:cc:e0:dc: 9c:ee:9c:41:07:ed:5b:42:1d:d2:15:b4:e7:f5:10:e2: 9c:c5:3b:cf:d2:d6:71:89:d4:76:ad:1b:f1:ff:e7:b0: 92:a7:be:dc:25:5b:d2:60:9e:72:f6:d8:c5:0b:39:80: c8:ac:71:cd:c0:b4:f1:3a:93:33:28:d0:d4:f1:13:5f: ae:c5:e6:a9:bc:d2:cb:ea:5d:6b:7e:c8:c0:86:4b:4e: 92:9f:d3:f6:24:ca:1f:2c:67:4e:8b:8b:ea:b7:78:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ad:f5:13:73:7e:a1:9d:6c:9b:33:45:23:c6:1a:af:7b: af:bd:4c:68:e0:1f:4a:0c:de:64:3d:a7:6c:f0:53:0e: 03:03:9d:59:24:20:8a:04:00:d0:e7:a7:5c:98:28:19: af:da:e4:22:9d:90:cb:8b:38:4e:0a:09:5f:05:b0:74: 80:e9:9b:9e:af:7a:3a:c9:0c:22:a7:aa:23:ac:bd:de: 5f:0b:4c:8f:7b:1e:28:31:e4:af:4f:83:7d:1b:d6:b9: cf:55:e0:30:48:01:5d:b9:da:75:87:53:f2:f5:db:b0: d1:26:2e:aa:78:08:71:13:ff:ba:dd:20:8d:f9:9f:0f Fingerprint (MD5): 1F:7A:75:3F:98:4A:B1:23:95:2C:D0:11:23:23:37:75 Fingerprint (SHA1): 1A:3F:8C:91:1C:29:A0:E2:FD:75:A0:C1:23:A7:07:E0:68:E2:CC:79 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1460: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173933 (0x137104ed) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Mar 26 21:39:25 2012 Not After : Sun Mar 26 21:39:25 2062 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:d2:bb:87:c0:b2:1d:99:f8:4a:a6:1d:48:25:1b:b3: 37:4d:78:34:e8:5a:d6:ad:25:76:08:d1:eb:a8:e3:96: a4:0f:23:bb:d6:7c:46:4a:f4:8e:34:ec:6b:ec:01:86: 5c:f9:3d:cb:3e:b4:ea:40:7c:a8:e4:d4:4d:fc:c1:e7: 4c:b3:1e:92:de:5f:d7:7d:8c:e0:42:38:2b:4b:60:0e: 8f:19:be:68:be:e9:b3:82:3b:f3:cf:52:e5:e5:d4:ad: 78:e4:a9:30:01:f4:68:a1:c8:ea:4d:61:9b:92:01:54: cc:47:6c:e1:a0:9d:82:12:eb:3c:be:ec:91:c6:6c:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 42:5a:16:a3:08:ef:11:ec:c1:c4:24:fc:73:b0:99:9e: 50:a1:6c:c9:f0:0b:6f:7d:3e:40:b7:8c:4f:fc:32:fd: e2:cd:05:ce:58:12:fc:f5:ec:be:6b:4e:aa:4e:5e:a6: d1:4b:d4:f9:f8:07:4d:90:77:c7:da:de:9b:67:b9:5f: 8c:c1:d0:21:80:4b:22:99:cf:d2:ad:00:09:ce:e5:08: d7:ab:d0:7f:77:fb:d8:66:8e:dc:19:db:4d:a9:59:2a: 81:3c:0f:17:fb:ee:43:9e:bc:d4:51:2c:14:dc:d7:4d: 4f:81:2d:d2:7d:04:13:37:3d:06:81:a0:7c:83:4a:27 Fingerprint (MD5): 75:AB:A9:53:6D:38:20:85:E9:3B:06:FA:F8:C4:F5:53 Fingerprint (SHA1): 8F:F2:75:18:BE:CE:F1:E8:9A:F3:1D:B4:DF:20:21:7E:9B:23:FF:4C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1461: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173934 (0x137104ee) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Mar 26 21:39:26 2012 Not After : Sun Mar 26 21:39:26 2062 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:50:49:3b:33:e1:29:62:23:01:3a:fd:8a:b0:63:08: c6:03:c7:c3:93:10:81:d9:c1:59:f0:72:92:b6:46:3f: b7:dc:ff:c7:d4:32:39:b9:b3:57:2d:29:8a:fc:43:1e: 63:91:ed:eb:12:83:11:7a:70:41:c9:f0:4c:8e:7e:79: 84:4d:4b:8a:af:d9:e6:21:8b:44:a8:95:a5:bc:df:1a: de:b6:5c:37:92:4a:a7:cf:72:5b:68:3d:40:a7:86:53: cd:10:7e:31:02:4e:85:9d:58:96:fd:bc:09:a1:3b:71: 8c:06:f0:3b:ff:b9:4b:c1:63:37:ae:20:3e:04:cb:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 42:88:94:e9:0a:02:05:24:9e:16:0c:55:c6:f5:f4:28: 24:87:80:82:aa:40:f9:95:88:b2:65:b8:19:13:b8:14: 91:46:ff:b0:8d:5f:f8:17:82:1b:94:ad:0b:87:14:bd: 75:45:48:ee:15:d4:c7:20:46:fa:93:96:e6:d9:02:c0: b6:8e:2c:8d:64:fb:39:b7:3a:c7:83:49:36:b8:cf:54: 92:98:10:94:14:ac:8d:fd:04:b6:f0:87:65:cf:69:dd: 01:7c:5a:88:90:2a:4d:d9:26:98:0d:47:4e:3e:8e:c7: 73:67:32:8f:74:a5:41:61:60:48:e0:6d:e2:6c:89:ca Fingerprint (MD5): 88:3D:C6:A1:AB:78:02:E7:72:B0:7A:0D:4D:30:63:F2 Fingerprint (SHA1): 0E:D8:DD:A0:D9:67:A4:B2:AB:B5:23:1B:02:BC:E6:36:73:7D:70:73 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1462: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1463: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326173949 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1464: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1465: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1466: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1467: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326173950 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1468: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1469: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1470: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1471: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326173951 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1472: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1473: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1474: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1475: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326173952 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1476: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #1477: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1478: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173949 (0x137104fd) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:29 2012 Not After : Sun Mar 26 21:39:29 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:43:4f:0a:53:0c:ce:a6:d0:bb:b1:48:04:c9:25:f9: de:f7:a0:c0:9a:ed:4e:f5:7f:d9:53:0b:0a:a9:eb:9b: 85:59:80:d4:8e:b0:8f:79:4e:44:09:71:6c:c3:05:cb: 6c:05:d7:c9:4b:3c:58:d9:9c:56:98:57:17:a6:65:6b: 97:51:75:a8:51:b2:33:a2:47:96:b6:e2:8b:81:52:46: 6b:97:83:74:e6:be:af:3c:61:80:09:50:53:09:6b:ad: c1:29:38:2c:fe:37:c8:28:d8:ff:25:39:21:7e:75:c7: d0:da:98:29:b9:44:94:d2:b7:ac:64:d8:c8:a0:b0:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3b:03:09:e1:ab:69:59:9f:10:da:32:b5:cd:fe:b6:8f: e5:9e:a6:ed:a3:b9:d6:e6:1d:9a:ce:84:e7:02:bb:b3: 1f:03:b0:58:7d:cb:31:28:78:e6:c3:53:ec:df:97:85: cb:bd:e9:6a:de:c2:f4:91:be:ba:51:e4:30:e7:2d:a3: 67:18:74:e4:65:b2:16:a7:14:db:47:2e:77:3c:81:0d: 10:b9:5f:3f:98:c0:b9:e7:dd:71:31:86:0d:5f:c3:da: fc:04:95:d9:fa:9f:6e:ca:6c:bc:40:a9:ce:73:90:ff: fe:b5:81:93:75:28:10:57:e3:60:69:5d:ac:46:df:72 Fingerprint (MD5): A7:00:6E:BF:2B:7A:0C:1F:00:E5:6E:7E:33:BC:6C:30 Fingerprint (SHA1): 59:4E:D2:9A:52:8F:77:FD:4D:78:79:A5:40:BB:A5:E3:9F:A3:67:7B Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1479: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1480: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173950 (0x137104fe) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:30 2012 Not After : Sun Mar 26 21:39:30 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:e3:a5:57:67:92:c0:69:21:3a:5d:7f:64:15:c9:12: 2f:f7:5b:72:f2:11:79:d9:f4:ad:0b:c8:93:96:a1:5b: 5d:ad:29:bf:2c:26:b3:37:1d:b5:53:16:a6:9a:1d:39: c0:91:0a:57:8f:72:0a:0c:03:17:cf:a3:16:e2:76:3e: 6d:b4:c2:74:a6:b4:6c:6b:1b:76:41:f9:57:ff:c3:4a: 5f:f1:95:b2:be:83:34:7c:d0:ef:ec:9d:d4:88:c6:64: c7:d8:b1:0d:28:80:1c:c3:09:dc:cc:d8:a0:91:72:62: 0c:ec:70:13:a2:b7:c0:dc:24:8d:84:2e:9c:f0:a3:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 37:15:74:ea:59:fa:ca:24:8a:7d:f9:98:33:66:97:81: 89:22:5d:2d:32:3c:51:c2:d0:10:47:22:a3:4b:bc:10: 47:73:00:49:dd:90:b6:a5:f4:7b:ec:f2:21:97:97:e8: eb:6a:2a:e8:18:94:7b:ec:90:90:e1:d2:1e:75:7f:0b: 01:63:eb:c8:59:b2:5d:53:0b:68:18:8c:45:93:96:66: a1:dc:42:dc:1e:2c:58:8b:0a:27:c0:c0:08:74:20:e4: 08:4e:71:21:56:62:4d:b1:fb:bd:a2:e2:de:dc:09:a0: a6:f4:df:c9:05:67:4b:75:ee:6e:8d:42:6d:00:fe:4c Fingerprint (MD5): 73:0F:0E:83:78:76:52:6E:35:99:C8:57:81:34:8F:7F Fingerprint (SHA1): 8B:08:0C:4F:A8:5D:E5:84:6C:42:E9:9A:7A:2F:97:DF:72:96:31:22 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1481: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1482: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173951 (0x137104ff) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:39:30 2012 Not After : Sun Mar 26 21:39:30 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:9d:89:d9:6e:a3:2f:f5:7b:16:39:1f:82:cc:ab:ec: ab:2b:08:11:ba:97:0a:a0:3f:21:75:de:7e:67:3d:e6: 02:ee:b6:e8:5b:09:a2:2f:9c:e7:08:08:9c:35:07:73: 9b:b2:54:dc:bc:70:76:bf:37:48:a2:22:55:28:e4:87: d1:6b:e9:98:7a:2c:5c:cc:5b:63:62:ee:d1:0a:5c:7d: 78:ee:36:95:55:58:11:64:39:03:12:c3:10:dd:b4:a3: 22:38:1a:e6:24:1a:06:ac:9b:52:f2:d9:d3:87:20:1d: ec:1e:e1:91:e7:07:74:8f:08:b2:23:4b:e4:ca:44:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c1:58:8f:53:ab:7c:97:5b:2d:88:ea:2d:1f:cf:df:d8: 4a:67:39:58:29:2e:24:eb:3c:34:2f:18:9b:86:7d:84: 17:bf:ff:79:8b:c8:b4:48:22:e6:78:64:97:9c:49:ff: 51:be:68:40:35:9b:99:4f:d2:9b:5d:28:35:f7:8c:2f: 58:b9:16:55:d0:e5:44:46:8b:cb:5f:65:27:15:c5:d0: 2b:1b:2c:63:34:ec:dd:a1:f2:c8:92:50:d2:f0:86:1e: 1c:5f:d3:9a:b1:44:f0:79:c9:05:13:e8:1c:49:46:04: fb:bd:05:b7:5a:f0:d2:00:4d:4a:ae:b2:30:2e:9d:78 Fingerprint (MD5): AE:1E:05:18:67:DA:4B:D2:A6:4B:E0:DB:F4:4D:E7:A2 Fingerprint (SHA1): AB:C7:F4:1E:EE:5E:46:02:51:9F:96:4A:FB:1B:C6:63:AE:57:17:5A Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1483: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1484: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1485: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1486: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1487: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173949 (0x137104fd) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:29 2012 Not After : Sun Mar 26 21:39:29 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:43:4f:0a:53:0c:ce:a6:d0:bb:b1:48:04:c9:25:f9: de:f7:a0:c0:9a:ed:4e:f5:7f:d9:53:0b:0a:a9:eb:9b: 85:59:80:d4:8e:b0:8f:79:4e:44:09:71:6c:c3:05:cb: 6c:05:d7:c9:4b:3c:58:d9:9c:56:98:57:17:a6:65:6b: 97:51:75:a8:51:b2:33:a2:47:96:b6:e2:8b:81:52:46: 6b:97:83:74:e6:be:af:3c:61:80:09:50:53:09:6b:ad: c1:29:38:2c:fe:37:c8:28:d8:ff:25:39:21:7e:75:c7: d0:da:98:29:b9:44:94:d2:b7:ac:64:d8:c8:a0:b0:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3b:03:09:e1:ab:69:59:9f:10:da:32:b5:cd:fe:b6:8f: e5:9e:a6:ed:a3:b9:d6:e6:1d:9a:ce:84:e7:02:bb:b3: 1f:03:b0:58:7d:cb:31:28:78:e6:c3:53:ec:df:97:85: cb:bd:e9:6a:de:c2:f4:91:be:ba:51:e4:30:e7:2d:a3: 67:18:74:e4:65:b2:16:a7:14:db:47:2e:77:3c:81:0d: 10:b9:5f:3f:98:c0:b9:e7:dd:71:31:86:0d:5f:c3:da: fc:04:95:d9:fa:9f:6e:ca:6c:bc:40:a9:ce:73:90:ff: fe:b5:81:93:75:28:10:57:e3:60:69:5d:ac:46:df:72 Fingerprint (MD5): A7:00:6E:BF:2B:7A:0C:1F:00:E5:6E:7E:33:BC:6C:30 Fingerprint (SHA1): 59:4E:D2:9A:52:8F:77:FD:4D:78:79:A5:40:BB:A5:E3:9F:A3:67:7B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1488: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1489: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173950 (0x137104fe) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:30 2012 Not After : Sun Mar 26 21:39:30 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:e3:a5:57:67:92:c0:69:21:3a:5d:7f:64:15:c9:12: 2f:f7:5b:72:f2:11:79:d9:f4:ad:0b:c8:93:96:a1:5b: 5d:ad:29:bf:2c:26:b3:37:1d:b5:53:16:a6:9a:1d:39: c0:91:0a:57:8f:72:0a:0c:03:17:cf:a3:16:e2:76:3e: 6d:b4:c2:74:a6:b4:6c:6b:1b:76:41:f9:57:ff:c3:4a: 5f:f1:95:b2:be:83:34:7c:d0:ef:ec:9d:d4:88:c6:64: c7:d8:b1:0d:28:80:1c:c3:09:dc:cc:d8:a0:91:72:62: 0c:ec:70:13:a2:b7:c0:dc:24:8d:84:2e:9c:f0:a3:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 37:15:74:ea:59:fa:ca:24:8a:7d:f9:98:33:66:97:81: 89:22:5d:2d:32:3c:51:c2:d0:10:47:22:a3:4b:bc:10: 47:73:00:49:dd:90:b6:a5:f4:7b:ec:f2:21:97:97:e8: eb:6a:2a:e8:18:94:7b:ec:90:90:e1:d2:1e:75:7f:0b: 01:63:eb:c8:59:b2:5d:53:0b:68:18:8c:45:93:96:66: a1:dc:42:dc:1e:2c:58:8b:0a:27:c0:c0:08:74:20:e4: 08:4e:71:21:56:62:4d:b1:fb:bd:a2:e2:de:dc:09:a0: a6:f4:df:c9:05:67:4b:75:ee:6e:8d:42:6d:00:fe:4c Fingerprint (MD5): 73:0F:0E:83:78:76:52:6E:35:99:C8:57:81:34:8F:7F Fingerprint (SHA1): 8B:08:0C:4F:A8:5D:E5:84:6C:42:E9:9A:7A:2F:97:DF:72:96:31:22 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1490: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1491: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173951 (0x137104ff) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:39:30 2012 Not After : Sun Mar 26 21:39:30 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:9d:89:d9:6e:a3:2f:f5:7b:16:39:1f:82:cc:ab:ec: ab:2b:08:11:ba:97:0a:a0:3f:21:75:de:7e:67:3d:e6: 02:ee:b6:e8:5b:09:a2:2f:9c:e7:08:08:9c:35:07:73: 9b:b2:54:dc:bc:70:76:bf:37:48:a2:22:55:28:e4:87: d1:6b:e9:98:7a:2c:5c:cc:5b:63:62:ee:d1:0a:5c:7d: 78:ee:36:95:55:58:11:64:39:03:12:c3:10:dd:b4:a3: 22:38:1a:e6:24:1a:06:ac:9b:52:f2:d9:d3:87:20:1d: ec:1e:e1:91:e7:07:74:8f:08:b2:23:4b:e4:ca:44:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c1:58:8f:53:ab:7c:97:5b:2d:88:ea:2d:1f:cf:df:d8: 4a:67:39:58:29:2e:24:eb:3c:34:2f:18:9b:86:7d:84: 17:bf:ff:79:8b:c8:b4:48:22:e6:78:64:97:9c:49:ff: 51:be:68:40:35:9b:99:4f:d2:9b:5d:28:35:f7:8c:2f: 58:b9:16:55:d0:e5:44:46:8b:cb:5f:65:27:15:c5:d0: 2b:1b:2c:63:34:ec:dd:a1:f2:c8:92:50:d2:f0:86:1e: 1c:5f:d3:9a:b1:44:f0:79:c9:05:13:e8:1c:49:46:04: fb:bd:05:b7:5a:f0:d2:00:4d:4a:ae:b2:30:2e:9d:78 Fingerprint (MD5): AE:1E:05:18:67:DA:4B:D2:A6:4B:E0:DB:F4:4D:E7:A2 Fingerprint (SHA1): AB:C7:F4:1E:EE:5E:46:02:51:9F:96:4A:FB:1B:C6:63:AE:57:17:5A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1492: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1493: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1494: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326173953 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1495: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1496: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1497: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1498: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326173954 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1499: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1500: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1501: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1502: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326173955 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1503: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1504: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1505: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1506: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 326173956 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1507: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #1508: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1509: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1510: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 326173957 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1511: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #1512: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1513: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173953 (0x13710501) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:32 2012 Not After : Sun Mar 26 21:39:32 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:71:ed:b4:22:87:c4:6e:de:24:a6:3c:a3:10:14:cc: bb:ec:d4:46:bb:e5:86:e1:01:90:f0:65:74:3e:3b:ad: 48:33:32:11:70:f1:30:51:ee:80:91:04:68:44:c5:87: 52:bb:24:09:f1:0c:37:3b:53:44:f7:81:01:8f:26:40: cf:cc:89:81:05:42:c0:52:57:ca:8c:72:ae:67:bd:7b: ba:bd:5e:c9:be:85:ef:92:b1:60:27:5d:1a:71:b8:69: bd:3f:f9:01:49:47:13:07:20:b2:95:5e:50:bf:7a:70: a6:5e:26:61:6e:88:b1:fe:4c:5e:c7:4e:66:2f:05:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 20:e0:2a:5e:ff:e4:09:dd:ee:26:eb:95:fc:ed:f1:76: da:ad:b0:fc:80:e0:03:b6:22:d8:27:23:ee:b0:7e:1c: 27:31:f6:17:b4:7b:1e:0e:68:df:a2:cb:f7:71:ca:e6: 8f:cf:59:de:bd:ea:4f:03:68:33:2d:5a:62:76:96:3b: 7c:6a:4c:f0:a4:52:55:9d:ac:09:d0:e2:85:86:a9:01: 56:06:71:27:34:c6:2e:04:37:c2:c5:3f:e6:c6:ab:09: 53:2c:b6:02:fa:cb:9d:e8:07:4a:d5:17:f4:ef:02:87: a7:de:cc:a6:6f:8e:4f:75:2f:f0:cb:98:a3:ea:96:3f Fingerprint (MD5): 38:DF:BF:15:2E:E8:7F:8D:E4:63:85:66:FF:7A:C5:AF Fingerprint (SHA1): D8:44:AF:61:D0:F2:EE:32:2C:0C:8D:30:CB:7B:9B:6B:15:D2:96:94 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1514: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1515: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173954 (0x13710502) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:32 2012 Not After : Sun Mar 26 21:39:32 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:b6:da:82:09:03:8a:c9:85:34:01:1e:37:63:3b:11: 3e:4b:b8:81:79:b1:ac:9e:e5:cc:82:b1:2b:d6:43:18: 3c:71:10:08:c6:60:a5:af:76:68:bf:1e:6d:44:00:1e: b2:18:f5:76:a9:fd:82:cf:df:26:5e:8f:bd:6d:7c:53: ee:90:c2:6a:22:4c:a4:ea:da:92:69:01:82:59:0f:23: 45:ba:f2:de:b9:82:cb:28:7a:ee:31:93:ea:98:60:5f: 90:58:e6:23:ed:82:e1:a1:23:f7:5a:4d:e2:4a:6e:dc: 26:c9:bf:5b:2f:86:d7:d1:78:80:06:47:fa:13:c7:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8d:c4:f2:10:eb:ae:2e:ce:b8:ca:4f:56:ac:5f:fa:b2: 63:88:77:49:8d:34:28:da:be:6e:8d:18:64:38:32:41: e9:5f:71:e0:47:99:63:f1:cf:dd:c8:07:de:9a:26:d3: 0f:da:f6:eb:1c:f9:20:20:94:88:15:59:be:d3:40:87: 2e:3c:d7:d2:fc:0e:b0:b4:db:9b:ef:9f:16:9f:01:22: b0:94:ed:a6:ec:68:1f:ec:8e:a9:ca:b1:ec:6a:be:f5: 29:a7:66:3c:c7:b6:d7:70:00:e6:3d:96:05:da:0c:71: 08:82:18:b0:73:fd:b2:24:ed:df:f1:68:1c:e9:e5:62 Fingerprint (MD5): 72:50:9D:1D:A8:94:87:7A:23:24:8A:52:CA:78:85:8F Fingerprint (SHA1): AF:FC:C8:0C:22:40:CE:CD:8F:5E:FE:30:1D:52:1A:85:77:3C:BB:5F Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1516: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1517: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173955 (0x13710503) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:39:33 2012 Not After : Sun Mar 26 21:39:33 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fe:b1:32:ba:ac:aa:09:ed:c8:3e:e6:e0:08:ca:be: ae:1f:9f:ce:f6:cd:f8:f8:12:ff:06:fd:8d:7c:66:c0: ce:c8:30:22:1c:e2:ac:81:7e:81:a8:7b:13:31:35:b6: fb:47:d1:af:1c:b1:e8:8b:33:37:ce:9d:fe:12:79:2c: 1a:c2:f7:7d:e0:56:20:87:6d:a0:34:0d:86:35:99:30: a5:e6:b4:06:d1:f6:52:0d:56:a8:65:5e:4b:76:60:19: fe:13:37:33:51:60:10:77:78:3c:ef:97:b5:ff:96:24: 70:18:7a:4f:f3:d4:ed:0c:02:1e:fb:cf:25:0d:9e:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: aa:f5:93:96:02:d7:5d:ef:01:de:10:99:10:ae:b5:fd: 18:19:cc:06:b7:9b:be:62:63:f4:b3:e0:51:20:43:80: 33:a6:68:39:0d:d0:e6:05:bc:48:04:88:4d:d4:86:c4: bd:50:f6:05:27:49:b6:3d:b7:57:fa:18:43:39:5b:f5: 61:ab:5f:f1:1a:79:4d:d2:f1:59:09:5a:31:48:7f:18: 65:8e:91:1e:6b:6d:f5:e3:cd:de:b9:72:1a:03:5f:d1: a2:d3:3a:6e:09:d2:6c:3f:f5:a8:28:a4:79:18:04:17: bb:fa:2b:ee:3a:69:8c:3b:43:78:58:8c:05:d3:4f:91 Fingerprint (MD5): FA:40:C4:14:2D:55:D8:A6:75:AB:7E:F6:2D:CD:98:9F Fingerprint (SHA1): C1:D8:E3:80:7F:84:C6:DE:D2:16:55:BD:16:00:76:97:98:42:3B:C0 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1518: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1519: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1520: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1521: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1522: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173953 (0x13710501) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:32 2012 Not After : Sun Mar 26 21:39:32 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:71:ed:b4:22:87:c4:6e:de:24:a6:3c:a3:10:14:cc: bb:ec:d4:46:bb:e5:86:e1:01:90:f0:65:74:3e:3b:ad: 48:33:32:11:70:f1:30:51:ee:80:91:04:68:44:c5:87: 52:bb:24:09:f1:0c:37:3b:53:44:f7:81:01:8f:26:40: cf:cc:89:81:05:42:c0:52:57:ca:8c:72:ae:67:bd:7b: ba:bd:5e:c9:be:85:ef:92:b1:60:27:5d:1a:71:b8:69: bd:3f:f9:01:49:47:13:07:20:b2:95:5e:50:bf:7a:70: a6:5e:26:61:6e:88:b1:fe:4c:5e:c7:4e:66:2f:05:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 20:e0:2a:5e:ff:e4:09:dd:ee:26:eb:95:fc:ed:f1:76: da:ad:b0:fc:80:e0:03:b6:22:d8:27:23:ee:b0:7e:1c: 27:31:f6:17:b4:7b:1e:0e:68:df:a2:cb:f7:71:ca:e6: 8f:cf:59:de:bd:ea:4f:03:68:33:2d:5a:62:76:96:3b: 7c:6a:4c:f0:a4:52:55:9d:ac:09:d0:e2:85:86:a9:01: 56:06:71:27:34:c6:2e:04:37:c2:c5:3f:e6:c6:ab:09: 53:2c:b6:02:fa:cb:9d:e8:07:4a:d5:17:f4:ef:02:87: a7:de:cc:a6:6f:8e:4f:75:2f:f0:cb:98:a3:ea:96:3f Fingerprint (MD5): 38:DF:BF:15:2E:E8:7F:8D:E4:63:85:66:FF:7A:C5:AF Fingerprint (SHA1): D8:44:AF:61:D0:F2:EE:32:2C:0C:8D:30:CB:7B:9B:6B:15:D2:96:94 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1523: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1524: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173954 (0x13710502) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:32 2012 Not After : Sun Mar 26 21:39:32 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:b6:da:82:09:03:8a:c9:85:34:01:1e:37:63:3b:11: 3e:4b:b8:81:79:b1:ac:9e:e5:cc:82:b1:2b:d6:43:18: 3c:71:10:08:c6:60:a5:af:76:68:bf:1e:6d:44:00:1e: b2:18:f5:76:a9:fd:82:cf:df:26:5e:8f:bd:6d:7c:53: ee:90:c2:6a:22:4c:a4:ea:da:92:69:01:82:59:0f:23: 45:ba:f2:de:b9:82:cb:28:7a:ee:31:93:ea:98:60:5f: 90:58:e6:23:ed:82:e1:a1:23:f7:5a:4d:e2:4a:6e:dc: 26:c9:bf:5b:2f:86:d7:d1:78:80:06:47:fa:13:c7:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8d:c4:f2:10:eb:ae:2e:ce:b8:ca:4f:56:ac:5f:fa:b2: 63:88:77:49:8d:34:28:da:be:6e:8d:18:64:38:32:41: e9:5f:71:e0:47:99:63:f1:cf:dd:c8:07:de:9a:26:d3: 0f:da:f6:eb:1c:f9:20:20:94:88:15:59:be:d3:40:87: 2e:3c:d7:d2:fc:0e:b0:b4:db:9b:ef:9f:16:9f:01:22: b0:94:ed:a6:ec:68:1f:ec:8e:a9:ca:b1:ec:6a:be:f5: 29:a7:66:3c:c7:b6:d7:70:00:e6:3d:96:05:da:0c:71: 08:82:18:b0:73:fd:b2:24:ed:df:f1:68:1c:e9:e5:62 Fingerprint (MD5): 72:50:9D:1D:A8:94:87:7A:23:24:8A:52:CA:78:85:8F Fingerprint (SHA1): AF:FC:C8:0C:22:40:CE:CD:8F:5E:FE:30:1D:52:1A:85:77:3C:BB:5F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1525: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1526: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173955 (0x13710503) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:39:33 2012 Not After : Sun Mar 26 21:39:33 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fe:b1:32:ba:ac:aa:09:ed:c8:3e:e6:e0:08:ca:be: ae:1f:9f:ce:f6:cd:f8:f8:12:ff:06:fd:8d:7c:66:c0: ce:c8:30:22:1c:e2:ac:81:7e:81:a8:7b:13:31:35:b6: fb:47:d1:af:1c:b1:e8:8b:33:37:ce:9d:fe:12:79:2c: 1a:c2:f7:7d:e0:56:20:87:6d:a0:34:0d:86:35:99:30: a5:e6:b4:06:d1:f6:52:0d:56:a8:65:5e:4b:76:60:19: fe:13:37:33:51:60:10:77:78:3c:ef:97:b5:ff:96:24: 70:18:7a:4f:f3:d4:ed:0c:02:1e:fb:cf:25:0d:9e:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: aa:f5:93:96:02:d7:5d:ef:01:de:10:99:10:ae:b5:fd: 18:19:cc:06:b7:9b:be:62:63:f4:b3:e0:51:20:43:80: 33:a6:68:39:0d:d0:e6:05:bc:48:04:88:4d:d4:86:c4: bd:50:f6:05:27:49:b6:3d:b7:57:fa:18:43:39:5b:f5: 61:ab:5f:f1:1a:79:4d:d2:f1:59:09:5a:31:48:7f:18: 65:8e:91:1e:6b:6d:f5:e3:cd:de:b9:72:1a:03:5f:d1: a2:d3:3a:6e:09:d2:6c:3f:f5:a8:28:a4:79:18:04:17: bb:fa:2b:ee:3a:69:8c:3b:43:78:58:8c:05:d3:4f:91 Fingerprint (MD5): FA:40:C4:14:2D:55:D8:A6:75:AB:7E:F6:2D:CD:98:9F Fingerprint (SHA1): C1:D8:E3:80:7F:84:C6:DE:D2:16:55:BD:16:00:76:97:98:42:3B:C0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1527: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1528: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173953 (0x13710501) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:32 2012 Not After : Sun Mar 26 21:39:32 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:71:ed:b4:22:87:c4:6e:de:24:a6:3c:a3:10:14:cc: bb:ec:d4:46:bb:e5:86:e1:01:90:f0:65:74:3e:3b:ad: 48:33:32:11:70:f1:30:51:ee:80:91:04:68:44:c5:87: 52:bb:24:09:f1:0c:37:3b:53:44:f7:81:01:8f:26:40: cf:cc:89:81:05:42:c0:52:57:ca:8c:72:ae:67:bd:7b: ba:bd:5e:c9:be:85:ef:92:b1:60:27:5d:1a:71:b8:69: bd:3f:f9:01:49:47:13:07:20:b2:95:5e:50:bf:7a:70: a6:5e:26:61:6e:88:b1:fe:4c:5e:c7:4e:66:2f:05:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 20:e0:2a:5e:ff:e4:09:dd:ee:26:eb:95:fc:ed:f1:76: da:ad:b0:fc:80:e0:03:b6:22:d8:27:23:ee:b0:7e:1c: 27:31:f6:17:b4:7b:1e:0e:68:df:a2:cb:f7:71:ca:e6: 8f:cf:59:de:bd:ea:4f:03:68:33:2d:5a:62:76:96:3b: 7c:6a:4c:f0:a4:52:55:9d:ac:09:d0:e2:85:86:a9:01: 56:06:71:27:34:c6:2e:04:37:c2:c5:3f:e6:c6:ab:09: 53:2c:b6:02:fa:cb:9d:e8:07:4a:d5:17:f4:ef:02:87: a7:de:cc:a6:6f:8e:4f:75:2f:f0:cb:98:a3:ea:96:3f Fingerprint (MD5): 38:DF:BF:15:2E:E8:7F:8D:E4:63:85:66:FF:7A:C5:AF Fingerprint (SHA1): D8:44:AF:61:D0:F2:EE:32:2C:0C:8D:30:CB:7B:9B:6B:15:D2:96:94 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1529: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173953 (0x13710501) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:32 2012 Not After : Sun Mar 26 21:39:32 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:71:ed:b4:22:87:c4:6e:de:24:a6:3c:a3:10:14:cc: bb:ec:d4:46:bb:e5:86:e1:01:90:f0:65:74:3e:3b:ad: 48:33:32:11:70:f1:30:51:ee:80:91:04:68:44:c5:87: 52:bb:24:09:f1:0c:37:3b:53:44:f7:81:01:8f:26:40: cf:cc:89:81:05:42:c0:52:57:ca:8c:72:ae:67:bd:7b: ba:bd:5e:c9:be:85:ef:92:b1:60:27:5d:1a:71:b8:69: bd:3f:f9:01:49:47:13:07:20:b2:95:5e:50:bf:7a:70: a6:5e:26:61:6e:88:b1:fe:4c:5e:c7:4e:66:2f:05:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 20:e0:2a:5e:ff:e4:09:dd:ee:26:eb:95:fc:ed:f1:76: da:ad:b0:fc:80:e0:03:b6:22:d8:27:23:ee:b0:7e:1c: 27:31:f6:17:b4:7b:1e:0e:68:df:a2:cb:f7:71:ca:e6: 8f:cf:59:de:bd:ea:4f:03:68:33:2d:5a:62:76:96:3b: 7c:6a:4c:f0:a4:52:55:9d:ac:09:d0:e2:85:86:a9:01: 56:06:71:27:34:c6:2e:04:37:c2:c5:3f:e6:c6:ab:09: 53:2c:b6:02:fa:cb:9d:e8:07:4a:d5:17:f4:ef:02:87: a7:de:cc:a6:6f:8e:4f:75:2f:f0:cb:98:a3:ea:96:3f Fingerprint (MD5): 38:DF:BF:15:2E:E8:7F:8D:E4:63:85:66:FF:7A:C5:AF Fingerprint (SHA1): D8:44:AF:61:D0:F2:EE:32:2C:0C:8D:30:CB:7B:9B:6B:15:D2:96:94 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1530: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173954 (0x13710502) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:32 2012 Not After : Sun Mar 26 21:39:32 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:b6:da:82:09:03:8a:c9:85:34:01:1e:37:63:3b:11: 3e:4b:b8:81:79:b1:ac:9e:e5:cc:82:b1:2b:d6:43:18: 3c:71:10:08:c6:60:a5:af:76:68:bf:1e:6d:44:00:1e: b2:18:f5:76:a9:fd:82:cf:df:26:5e:8f:bd:6d:7c:53: ee:90:c2:6a:22:4c:a4:ea:da:92:69:01:82:59:0f:23: 45:ba:f2:de:b9:82:cb:28:7a:ee:31:93:ea:98:60:5f: 90:58:e6:23:ed:82:e1:a1:23:f7:5a:4d:e2:4a:6e:dc: 26:c9:bf:5b:2f:86:d7:d1:78:80:06:47:fa:13:c7:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8d:c4:f2:10:eb:ae:2e:ce:b8:ca:4f:56:ac:5f:fa:b2: 63:88:77:49:8d:34:28:da:be:6e:8d:18:64:38:32:41: e9:5f:71:e0:47:99:63:f1:cf:dd:c8:07:de:9a:26:d3: 0f:da:f6:eb:1c:f9:20:20:94:88:15:59:be:d3:40:87: 2e:3c:d7:d2:fc:0e:b0:b4:db:9b:ef:9f:16:9f:01:22: b0:94:ed:a6:ec:68:1f:ec:8e:a9:ca:b1:ec:6a:be:f5: 29:a7:66:3c:c7:b6:d7:70:00:e6:3d:96:05:da:0c:71: 08:82:18:b0:73:fd:b2:24:ed:df:f1:68:1c:e9:e5:62 Fingerprint (MD5): 72:50:9D:1D:A8:94:87:7A:23:24:8A:52:CA:78:85:8F Fingerprint (SHA1): AF:FC:C8:0C:22:40:CE:CD:8F:5E:FE:30:1D:52:1A:85:77:3C:BB:5F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1531: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173954 (0x13710502) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:32 2012 Not After : Sun Mar 26 21:39:32 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:b6:da:82:09:03:8a:c9:85:34:01:1e:37:63:3b:11: 3e:4b:b8:81:79:b1:ac:9e:e5:cc:82:b1:2b:d6:43:18: 3c:71:10:08:c6:60:a5:af:76:68:bf:1e:6d:44:00:1e: b2:18:f5:76:a9:fd:82:cf:df:26:5e:8f:bd:6d:7c:53: ee:90:c2:6a:22:4c:a4:ea:da:92:69:01:82:59:0f:23: 45:ba:f2:de:b9:82:cb:28:7a:ee:31:93:ea:98:60:5f: 90:58:e6:23:ed:82:e1:a1:23:f7:5a:4d:e2:4a:6e:dc: 26:c9:bf:5b:2f:86:d7:d1:78:80:06:47:fa:13:c7:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8d:c4:f2:10:eb:ae:2e:ce:b8:ca:4f:56:ac:5f:fa:b2: 63:88:77:49:8d:34:28:da:be:6e:8d:18:64:38:32:41: e9:5f:71:e0:47:99:63:f1:cf:dd:c8:07:de:9a:26:d3: 0f:da:f6:eb:1c:f9:20:20:94:88:15:59:be:d3:40:87: 2e:3c:d7:d2:fc:0e:b0:b4:db:9b:ef:9f:16:9f:01:22: b0:94:ed:a6:ec:68:1f:ec:8e:a9:ca:b1:ec:6a:be:f5: 29:a7:66:3c:c7:b6:d7:70:00:e6:3d:96:05:da:0c:71: 08:82:18:b0:73:fd:b2:24:ed:df:f1:68:1c:e9:e5:62 Fingerprint (MD5): 72:50:9D:1D:A8:94:87:7A:23:24:8A:52:CA:78:85:8F Fingerprint (SHA1): AF:FC:C8:0C:22:40:CE:CD:8F:5E:FE:30:1D:52:1A:85:77:3C:BB:5F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1532: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173955 (0x13710503) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:39:33 2012 Not After : Sun Mar 26 21:39:33 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fe:b1:32:ba:ac:aa:09:ed:c8:3e:e6:e0:08:ca:be: ae:1f:9f:ce:f6:cd:f8:f8:12:ff:06:fd:8d:7c:66:c0: ce:c8:30:22:1c:e2:ac:81:7e:81:a8:7b:13:31:35:b6: fb:47:d1:af:1c:b1:e8:8b:33:37:ce:9d:fe:12:79:2c: 1a:c2:f7:7d:e0:56:20:87:6d:a0:34:0d:86:35:99:30: a5:e6:b4:06:d1:f6:52:0d:56:a8:65:5e:4b:76:60:19: fe:13:37:33:51:60:10:77:78:3c:ef:97:b5:ff:96:24: 70:18:7a:4f:f3:d4:ed:0c:02:1e:fb:cf:25:0d:9e:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: aa:f5:93:96:02:d7:5d:ef:01:de:10:99:10:ae:b5:fd: 18:19:cc:06:b7:9b:be:62:63:f4:b3:e0:51:20:43:80: 33:a6:68:39:0d:d0:e6:05:bc:48:04:88:4d:d4:86:c4: bd:50:f6:05:27:49:b6:3d:b7:57:fa:18:43:39:5b:f5: 61:ab:5f:f1:1a:79:4d:d2:f1:59:09:5a:31:48:7f:18: 65:8e:91:1e:6b:6d:f5:e3:cd:de:b9:72:1a:03:5f:d1: a2:d3:3a:6e:09:d2:6c:3f:f5:a8:28:a4:79:18:04:17: bb:fa:2b:ee:3a:69:8c:3b:43:78:58:8c:05:d3:4f:91 Fingerprint (MD5): FA:40:C4:14:2D:55:D8:A6:75:AB:7E:F6:2D:CD:98:9F Fingerprint (SHA1): C1:D8:E3:80:7F:84:C6:DE:D2:16:55:BD:16:00:76:97:98:42:3B:C0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1533: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173955 (0x13710503) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:39:33 2012 Not After : Sun Mar 26 21:39:33 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fe:b1:32:ba:ac:aa:09:ed:c8:3e:e6:e0:08:ca:be: ae:1f:9f:ce:f6:cd:f8:f8:12:ff:06:fd:8d:7c:66:c0: ce:c8:30:22:1c:e2:ac:81:7e:81:a8:7b:13:31:35:b6: fb:47:d1:af:1c:b1:e8:8b:33:37:ce:9d:fe:12:79:2c: 1a:c2:f7:7d:e0:56:20:87:6d:a0:34:0d:86:35:99:30: a5:e6:b4:06:d1:f6:52:0d:56:a8:65:5e:4b:76:60:19: fe:13:37:33:51:60:10:77:78:3c:ef:97:b5:ff:96:24: 70:18:7a:4f:f3:d4:ed:0c:02:1e:fb:cf:25:0d:9e:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: aa:f5:93:96:02:d7:5d:ef:01:de:10:99:10:ae:b5:fd: 18:19:cc:06:b7:9b:be:62:63:f4:b3:e0:51:20:43:80: 33:a6:68:39:0d:d0:e6:05:bc:48:04:88:4d:d4:86:c4: bd:50:f6:05:27:49:b6:3d:b7:57:fa:18:43:39:5b:f5: 61:ab:5f:f1:1a:79:4d:d2:f1:59:09:5a:31:48:7f:18: 65:8e:91:1e:6b:6d:f5:e3:cd:de:b9:72:1a:03:5f:d1: a2:d3:3a:6e:09:d2:6c:3f:f5:a8:28:a4:79:18:04:17: bb:fa:2b:ee:3a:69:8c:3b:43:78:58:8c:05:d3:4f:91 Fingerprint (MD5): FA:40:C4:14:2D:55:D8:A6:75:AB:7E:F6:2D:CD:98:9F Fingerprint (SHA1): C1:D8:E3:80:7F:84:C6:DE:D2:16:55:BD:16:00:76:97:98:42:3B:C0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1534: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1535: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326173958 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1536: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1537: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1538: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1539: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 326173959 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1540: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #1541: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1542: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1543: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326173960 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1544: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1545: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1546: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1547: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 326173961 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1548: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der chains.sh: #1549: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1550: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1551: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 326173962 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1552: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #1553: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1554: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1555: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 326173963 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1556: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #1557: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1558: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1559: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 326173964 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1560: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der chains.sh: #1561: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1562: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1563: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1564: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1565: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1566: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173958 (0x13710506) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:39:35 2012 Not After : Sun Mar 26 21:39:35 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:03:18:76:6c:aa:05:0c:6a:73:9d:55:10:f8:fa:39: ab:78:6a:4e:70:f2:89:e3:5b:fa:b4:ee:b2:14:ec:8e: 8d:52:4e:c7:16:22:b7:72:4d:cf:eb:a1:a7:0c:4b:6c: aa:88:6f:88:a0:04:9e:4d:a9:5a:15:1d:12:82:20:4c: 61:c6:fd:9d:bc:d5:06:11:3b:fc:e8:a4:f9:1f:d5:19: b5:ac:2c:f6:d7:0e:da:75:84:d0:5a:4b:e0:00:84:91: 35:1b:44:89:95:5c:71:a2:07:5a:97:4e:2d:2e:bd:33: 30:76:6c:bc:4a:2c:7c:c4:3c:9c:68:8a:e5:10:59:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 31:b4:42:dc:d2:d4:97:ac:77:7c:7c:a5:38:36:1e:b7: 6b:02:71:27:29:82:37:15:9a:56:58:be:76:08:fe:4f: bd:f6:c2:54:0e:3b:c8:c4:99:3d:95:21:9f:be:a4:2a: 4f:53:a4:a7:ff:e6:b6:92:e7:2a:f7:db:d1:95:27:a4: 76:26:21:6a:e2:7b:fb:e4:cc:91:50:24:3e:a4:83:4e: 54:1c:44:79:ee:ee:ca:8c:e6:09:21:e6:01:54:93:4f: fb:0e:f4:fc:df:c4:2e:2b:d7:e7:95:22:28:a5:be:47: 96:d4:c6:c5:b1:cf:35:c8:32:22:2f:ae:05:5e:1a:be Fingerprint (MD5): AB:34:67:DA:63:89:D6:30:6F:1A:42:5B:14:05:16:45 Fingerprint (SHA1): 6B:C8:4A:4B:DC:F0:09:B7:0B:DF:E7:E8:98:D7:51:85:F7:8F:C1:22 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1567: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1568: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1569: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1570: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173958 (0x13710506) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:39:35 2012 Not After : Sun Mar 26 21:39:35 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:03:18:76:6c:aa:05:0c:6a:73:9d:55:10:f8:fa:39: ab:78:6a:4e:70:f2:89:e3:5b:fa:b4:ee:b2:14:ec:8e: 8d:52:4e:c7:16:22:b7:72:4d:cf:eb:a1:a7:0c:4b:6c: aa:88:6f:88:a0:04:9e:4d:a9:5a:15:1d:12:82:20:4c: 61:c6:fd:9d:bc:d5:06:11:3b:fc:e8:a4:f9:1f:d5:19: b5:ac:2c:f6:d7:0e:da:75:84:d0:5a:4b:e0:00:84:91: 35:1b:44:89:95:5c:71:a2:07:5a:97:4e:2d:2e:bd:33: 30:76:6c:bc:4a:2c:7c:c4:3c:9c:68:8a:e5:10:59:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 31:b4:42:dc:d2:d4:97:ac:77:7c:7c:a5:38:36:1e:b7: 6b:02:71:27:29:82:37:15:9a:56:58:be:76:08:fe:4f: bd:f6:c2:54:0e:3b:c8:c4:99:3d:95:21:9f:be:a4:2a: 4f:53:a4:a7:ff:e6:b6:92:e7:2a:f7:db:d1:95:27:a4: 76:26:21:6a:e2:7b:fb:e4:cc:91:50:24:3e:a4:83:4e: 54:1c:44:79:ee:ee:ca:8c:e6:09:21:e6:01:54:93:4f: fb:0e:f4:fc:df:c4:2e:2b:d7:e7:95:22:28:a5:be:47: 96:d4:c6:c5:b1:cf:35:c8:32:22:2f:ae:05:5e:1a:be Fingerprint (MD5): AB:34:67:DA:63:89:D6:30:6F:1A:42:5B:14:05:16:45 Fingerprint (SHA1): 6B:C8:4A:4B:DC:F0:09:B7:0B:DF:E7:E8:98:D7:51:85:F7:8F:C1:22 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1571: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1572: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1573: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326173965 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1574: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1575: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1576: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1577: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 326173966 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1578: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #1579: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1580: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1581: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 326173967 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1582: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der chains.sh: #1583: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1584: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1585: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 326173968 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1586: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der chains.sh: #1587: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1588: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1589: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 326173969 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1590: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der chains.sh: #1591: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1592: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1593: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 326173970 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1594: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der chains.sh: #1595: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1596: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1597: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 326173971 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1598: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der chains.sh: #1599: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1600: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1601: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 326173972 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1602: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der chains.sh: #1603: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1604: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1605: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 326173973 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1606: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der chains.sh: #1607: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1608: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1609: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 326173974 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1610: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der chains.sh: #1611: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1612: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1613: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 326173975 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1614: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der chains.sh: #1615: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1616: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1617: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 326173976 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1618: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der chains.sh: #1619: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1620: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1621: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 326173977 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1622: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der chains.sh: #1623: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1624: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1625: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 326173978 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1626: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der chains.sh: #1627: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1628: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1629: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 326173979 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1630: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der chains.sh: #1631: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1632: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1633: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 326173980 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1634: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der chains.sh: #1635: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1636: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1637: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 326173981 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1638: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der chains.sh: #1639: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1640: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1641: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 326173982 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1642: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der chains.sh: #1643: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1644: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1645: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 326173983 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1646: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der chains.sh: #1647: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1648: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1649: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 326173984 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1650: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der chains.sh: #1651: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1652: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1653: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 326173985 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1654: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der chains.sh: #1655: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1656: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1657: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 326173986 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1658: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der chains.sh: #1659: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1660: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1661: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 326173987 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1662: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der chains.sh: #1663: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1664: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1665: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 326173988 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1666: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der chains.sh: #1667: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1668: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1669: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 326173989 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1670: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der chains.sh: #1671: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1672: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1673: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 326173990 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1674: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der chains.sh: #1675: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1676: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1677: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 326173991 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1678: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der chains.sh: #1679: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1680: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1681: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 326173992 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1682: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der chains.sh: #1683: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1684: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1685: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 326173993 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1686: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der chains.sh: #1687: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1688: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1689: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 326173994 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1690: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der chains.sh: #1691: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1692: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173965 (0x1371050d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:39:39 2012 Not After : Sun Mar 26 21:39:39 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:fd:c4:13:45:75:f6:2f:95:6a:cf:2c:83:e4:65:8b: 97:67:62:b7:c5:1d:26:a3:78:76:1b:ae:56:66:9c:22: 59:fa:24:6d:1a:94:e6:5b:00:fb:dc:f1:a6:c7:fc:de: 3b:b5:d3:6f:67:6d:49:43:89:ea:ae:82:21:86:0b:d3: 18:5b:5b:fe:b8:20:1b:5a:5d:af:e2:c1:ce:ba:43:f1: 6a:1c:6a:79:a9:27:65:cb:4f:34:9e:ed:56:f9:c3:0c: 25:f9:71:91:aa:2c:ec:cd:89:ab:71:15:a2:41:bb:17: c7:c8:23:a3:05:cd:f9:30:48:a8:4c:d0:9a:7c:8a:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:06:e3:1c:95:74:64:d5:6b:0a:13:9a:f7:c3:68:7b: 6c:3e:71:b7:17:2c:06:66:1f:0f:8d:f4:33:98:8b:a7: 79:02:18:a9:e6:38:c4:12:67:7e:7d:d9:ca:82:3b:e2: 1d:20:d5:e5:f2:b0:c8:39:95:e7:2a:ad:3c:2b:b9:ce: 0d:2f:bc:bb:7f:c6:0a:62:c5:d5:8e:d9:e5:ed:4c:ac: 5c:50:cf:13:0a:e5:a5:b0:e2:03:0d:e1:cc:dd:10:66: ea:94:72:93:61:ca:f5:78:99:99:81:72:a9:a4:17:93: c8:82:6f:32:9e:8a:ed:5e:0f:5e:46:48:45:c0:01:a4 Fingerprint (MD5): D9:21:D2:49:3A:AF:92:49:31:5C:3A:FC:D3:03:34:1A Fingerprint (SHA1): FC:1F:00:77:A9:A9:A1:D5:37:C0:1F:B9:92:B3:B9:C8:4C:1E:93:FB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1693: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1694: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173965 (0x1371050d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:39:39 2012 Not After : Sun Mar 26 21:39:39 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:fd:c4:13:45:75:f6:2f:95:6a:cf:2c:83:e4:65:8b: 97:67:62:b7:c5:1d:26:a3:78:76:1b:ae:56:66:9c:22: 59:fa:24:6d:1a:94:e6:5b:00:fb:dc:f1:a6:c7:fc:de: 3b:b5:d3:6f:67:6d:49:43:89:ea:ae:82:21:86:0b:d3: 18:5b:5b:fe:b8:20:1b:5a:5d:af:e2:c1:ce:ba:43:f1: 6a:1c:6a:79:a9:27:65:cb:4f:34:9e:ed:56:f9:c3:0c: 25:f9:71:91:aa:2c:ec:cd:89:ab:71:15:a2:41:bb:17: c7:c8:23:a3:05:cd:f9:30:48:a8:4c:d0:9a:7c:8a:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:06:e3:1c:95:74:64:d5:6b:0a:13:9a:f7:c3:68:7b: 6c:3e:71:b7:17:2c:06:66:1f:0f:8d:f4:33:98:8b:a7: 79:02:18:a9:e6:38:c4:12:67:7e:7d:d9:ca:82:3b:e2: 1d:20:d5:e5:f2:b0:c8:39:95:e7:2a:ad:3c:2b:b9:ce: 0d:2f:bc:bb:7f:c6:0a:62:c5:d5:8e:d9:e5:ed:4c:ac: 5c:50:cf:13:0a:e5:a5:b0:e2:03:0d:e1:cc:dd:10:66: ea:94:72:93:61:ca:f5:78:99:99:81:72:a9:a4:17:93: c8:82:6f:32:9e:8a:ed:5e:0f:5e:46:48:45:c0:01:a4 Fingerprint (MD5): D9:21:D2:49:3A:AF:92:49:31:5C:3A:FC:D3:03:34:1A Fingerprint (SHA1): FC:1F:00:77:A9:A9:A1:D5:37:C0:1F:B9:92:B3:B9:C8:4C:1E:93:FB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1695: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1696: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1697: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1698: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173965 (0x1371050d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:39:39 2012 Not After : Sun Mar 26 21:39:39 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:fd:c4:13:45:75:f6:2f:95:6a:cf:2c:83:e4:65:8b: 97:67:62:b7:c5:1d:26:a3:78:76:1b:ae:56:66:9c:22: 59:fa:24:6d:1a:94:e6:5b:00:fb:dc:f1:a6:c7:fc:de: 3b:b5:d3:6f:67:6d:49:43:89:ea:ae:82:21:86:0b:d3: 18:5b:5b:fe:b8:20:1b:5a:5d:af:e2:c1:ce:ba:43:f1: 6a:1c:6a:79:a9:27:65:cb:4f:34:9e:ed:56:f9:c3:0c: 25:f9:71:91:aa:2c:ec:cd:89:ab:71:15:a2:41:bb:17: c7:c8:23:a3:05:cd:f9:30:48:a8:4c:d0:9a:7c:8a:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:06:e3:1c:95:74:64:d5:6b:0a:13:9a:f7:c3:68:7b: 6c:3e:71:b7:17:2c:06:66:1f:0f:8d:f4:33:98:8b:a7: 79:02:18:a9:e6:38:c4:12:67:7e:7d:d9:ca:82:3b:e2: 1d:20:d5:e5:f2:b0:c8:39:95:e7:2a:ad:3c:2b:b9:ce: 0d:2f:bc:bb:7f:c6:0a:62:c5:d5:8e:d9:e5:ed:4c:ac: 5c:50:cf:13:0a:e5:a5:b0:e2:03:0d:e1:cc:dd:10:66: ea:94:72:93:61:ca:f5:78:99:99:81:72:a9:a4:17:93: c8:82:6f:32:9e:8a:ed:5e:0f:5e:46:48:45:c0:01:a4 Fingerprint (MD5): D9:21:D2:49:3A:AF:92:49:31:5C:3A:FC:D3:03:34:1A Fingerprint (SHA1): FC:1F:00:77:A9:A9:A1:D5:37:C0:1F:B9:92:B3:B9:C8:4C:1E:93:FB Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1699: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1700: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1701: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1702: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173965 (0x1371050d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:39:39 2012 Not After : Sun Mar 26 21:39:39 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:fd:c4:13:45:75:f6:2f:95:6a:cf:2c:83:e4:65:8b: 97:67:62:b7:c5:1d:26:a3:78:76:1b:ae:56:66:9c:22: 59:fa:24:6d:1a:94:e6:5b:00:fb:dc:f1:a6:c7:fc:de: 3b:b5:d3:6f:67:6d:49:43:89:ea:ae:82:21:86:0b:d3: 18:5b:5b:fe:b8:20:1b:5a:5d:af:e2:c1:ce:ba:43:f1: 6a:1c:6a:79:a9:27:65:cb:4f:34:9e:ed:56:f9:c3:0c: 25:f9:71:91:aa:2c:ec:cd:89:ab:71:15:a2:41:bb:17: c7:c8:23:a3:05:cd:f9:30:48:a8:4c:d0:9a:7c:8a:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:06:e3:1c:95:74:64:d5:6b:0a:13:9a:f7:c3:68:7b: 6c:3e:71:b7:17:2c:06:66:1f:0f:8d:f4:33:98:8b:a7: 79:02:18:a9:e6:38:c4:12:67:7e:7d:d9:ca:82:3b:e2: 1d:20:d5:e5:f2:b0:c8:39:95:e7:2a:ad:3c:2b:b9:ce: 0d:2f:bc:bb:7f:c6:0a:62:c5:d5:8e:d9:e5:ed:4c:ac: 5c:50:cf:13:0a:e5:a5:b0:e2:03:0d:e1:cc:dd:10:66: ea:94:72:93:61:ca:f5:78:99:99:81:72:a9:a4:17:93: c8:82:6f:32:9e:8a:ed:5e:0f:5e:46:48:45:c0:01:a4 Fingerprint (MD5): D9:21:D2:49:3A:AF:92:49:31:5C:3A:FC:D3:03:34:1A Fingerprint (SHA1): FC:1F:00:77:A9:A9:A1:D5:37:C0:1F:B9:92:B3:B9:C8:4C:1E:93:FB Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1703: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173965 (0x1371050d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:39:39 2012 Not After : Sun Mar 26 21:39:39 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:fd:c4:13:45:75:f6:2f:95:6a:cf:2c:83:e4:65:8b: 97:67:62:b7:c5:1d:26:a3:78:76:1b:ae:56:66:9c:22: 59:fa:24:6d:1a:94:e6:5b:00:fb:dc:f1:a6:c7:fc:de: 3b:b5:d3:6f:67:6d:49:43:89:ea:ae:82:21:86:0b:d3: 18:5b:5b:fe:b8:20:1b:5a:5d:af:e2:c1:ce:ba:43:f1: 6a:1c:6a:79:a9:27:65:cb:4f:34:9e:ed:56:f9:c3:0c: 25:f9:71:91:aa:2c:ec:cd:89:ab:71:15:a2:41:bb:17: c7:c8:23:a3:05:cd:f9:30:48:a8:4c:d0:9a:7c:8a:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:06:e3:1c:95:74:64:d5:6b:0a:13:9a:f7:c3:68:7b: 6c:3e:71:b7:17:2c:06:66:1f:0f:8d:f4:33:98:8b:a7: 79:02:18:a9:e6:38:c4:12:67:7e:7d:d9:ca:82:3b:e2: 1d:20:d5:e5:f2:b0:c8:39:95:e7:2a:ad:3c:2b:b9:ce: 0d:2f:bc:bb:7f:c6:0a:62:c5:d5:8e:d9:e5:ed:4c:ac: 5c:50:cf:13:0a:e5:a5:b0:e2:03:0d:e1:cc:dd:10:66: ea:94:72:93:61:ca:f5:78:99:99:81:72:a9:a4:17:93: c8:82:6f:32:9e:8a:ed:5e:0f:5e:46:48:45:c0:01:a4 Fingerprint (MD5): D9:21:D2:49:3A:AF:92:49:31:5C:3A:FC:D3:03:34:1A Fingerprint (SHA1): FC:1F:00:77:A9:A9:A1:D5:37:C0:1F:B9:92:B3:B9:C8:4C:1E:93:FB Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1704: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1705: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173965 (0x1371050d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:39:39 2012 Not After : Sun Mar 26 21:39:39 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:fd:c4:13:45:75:f6:2f:95:6a:cf:2c:83:e4:65:8b: 97:67:62:b7:c5:1d:26:a3:78:76:1b:ae:56:66:9c:22: 59:fa:24:6d:1a:94:e6:5b:00:fb:dc:f1:a6:c7:fc:de: 3b:b5:d3:6f:67:6d:49:43:89:ea:ae:82:21:86:0b:d3: 18:5b:5b:fe:b8:20:1b:5a:5d:af:e2:c1:ce:ba:43:f1: 6a:1c:6a:79:a9:27:65:cb:4f:34:9e:ed:56:f9:c3:0c: 25:f9:71:91:aa:2c:ec:cd:89:ab:71:15:a2:41:bb:17: c7:c8:23:a3:05:cd:f9:30:48:a8:4c:d0:9a:7c:8a:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:06:e3:1c:95:74:64:d5:6b:0a:13:9a:f7:c3:68:7b: 6c:3e:71:b7:17:2c:06:66:1f:0f:8d:f4:33:98:8b:a7: 79:02:18:a9:e6:38:c4:12:67:7e:7d:d9:ca:82:3b:e2: 1d:20:d5:e5:f2:b0:c8:39:95:e7:2a:ad:3c:2b:b9:ce: 0d:2f:bc:bb:7f:c6:0a:62:c5:d5:8e:d9:e5:ed:4c:ac: 5c:50:cf:13:0a:e5:a5:b0:e2:03:0d:e1:cc:dd:10:66: ea:94:72:93:61:ca:f5:78:99:99:81:72:a9:a4:17:93: c8:82:6f:32:9e:8a:ed:5e:0f:5e:46:48:45:c0:01:a4 Fingerprint (MD5): D9:21:D2:49:3A:AF:92:49:31:5C:3A:FC:D3:03:34:1A Fingerprint (SHA1): FC:1F:00:77:A9:A9:A1:D5:37:C0:1F:B9:92:B3:B9:C8:4C:1E:93:FB Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1706: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1707: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1708: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1709: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173965 (0x1371050d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:39:39 2012 Not After : Sun Mar 26 21:39:39 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:fd:c4:13:45:75:f6:2f:95:6a:cf:2c:83:e4:65:8b: 97:67:62:b7:c5:1d:26:a3:78:76:1b:ae:56:66:9c:22: 59:fa:24:6d:1a:94:e6:5b:00:fb:dc:f1:a6:c7:fc:de: 3b:b5:d3:6f:67:6d:49:43:89:ea:ae:82:21:86:0b:d3: 18:5b:5b:fe:b8:20:1b:5a:5d:af:e2:c1:ce:ba:43:f1: 6a:1c:6a:79:a9:27:65:cb:4f:34:9e:ed:56:f9:c3:0c: 25:f9:71:91:aa:2c:ec:cd:89:ab:71:15:a2:41:bb:17: c7:c8:23:a3:05:cd:f9:30:48:a8:4c:d0:9a:7c:8a:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:06:e3:1c:95:74:64:d5:6b:0a:13:9a:f7:c3:68:7b: 6c:3e:71:b7:17:2c:06:66:1f:0f:8d:f4:33:98:8b:a7: 79:02:18:a9:e6:38:c4:12:67:7e:7d:d9:ca:82:3b:e2: 1d:20:d5:e5:f2:b0:c8:39:95:e7:2a:ad:3c:2b:b9:ce: 0d:2f:bc:bb:7f:c6:0a:62:c5:d5:8e:d9:e5:ed:4c:ac: 5c:50:cf:13:0a:e5:a5:b0:e2:03:0d:e1:cc:dd:10:66: ea:94:72:93:61:ca:f5:78:99:99:81:72:a9:a4:17:93: c8:82:6f:32:9e:8a:ed:5e:0f:5e:46:48:45:c0:01:a4 Fingerprint (MD5): D9:21:D2:49:3A:AF:92:49:31:5C:3A:FC:D3:03:34:1A Fingerprint (SHA1): FC:1F:00:77:A9:A9:A1:D5:37:C0:1F:B9:92:B3:B9:C8:4C:1E:93:FB Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1710: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173965 (0x1371050d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:39:39 2012 Not After : Sun Mar 26 21:39:39 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:fd:c4:13:45:75:f6:2f:95:6a:cf:2c:83:e4:65:8b: 97:67:62:b7:c5:1d:26:a3:78:76:1b:ae:56:66:9c:22: 59:fa:24:6d:1a:94:e6:5b:00:fb:dc:f1:a6:c7:fc:de: 3b:b5:d3:6f:67:6d:49:43:89:ea:ae:82:21:86:0b:d3: 18:5b:5b:fe:b8:20:1b:5a:5d:af:e2:c1:ce:ba:43:f1: 6a:1c:6a:79:a9:27:65:cb:4f:34:9e:ed:56:f9:c3:0c: 25:f9:71:91:aa:2c:ec:cd:89:ab:71:15:a2:41:bb:17: c7:c8:23:a3:05:cd:f9:30:48:a8:4c:d0:9a:7c:8a:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:06:e3:1c:95:74:64:d5:6b:0a:13:9a:f7:c3:68:7b: 6c:3e:71:b7:17:2c:06:66:1f:0f:8d:f4:33:98:8b:a7: 79:02:18:a9:e6:38:c4:12:67:7e:7d:d9:ca:82:3b:e2: 1d:20:d5:e5:f2:b0:c8:39:95:e7:2a:ad:3c:2b:b9:ce: 0d:2f:bc:bb:7f:c6:0a:62:c5:d5:8e:d9:e5:ed:4c:ac: 5c:50:cf:13:0a:e5:a5:b0:e2:03:0d:e1:cc:dd:10:66: ea:94:72:93:61:ca:f5:78:99:99:81:72:a9:a4:17:93: c8:82:6f:32:9e:8a:ed:5e:0f:5e:46:48:45:c0:01:a4 Fingerprint (MD5): D9:21:D2:49:3A:AF:92:49:31:5C:3A:FC:D3:03:34:1A Fingerprint (SHA1): FC:1F:00:77:A9:A9:A1:D5:37:C0:1F:B9:92:B3:B9:C8:4C:1E:93:FB Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1711: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173965 (0x1371050d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:39:39 2012 Not After : Sun Mar 26 21:39:39 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:fd:c4:13:45:75:f6:2f:95:6a:cf:2c:83:e4:65:8b: 97:67:62:b7:c5:1d:26:a3:78:76:1b:ae:56:66:9c:22: 59:fa:24:6d:1a:94:e6:5b:00:fb:dc:f1:a6:c7:fc:de: 3b:b5:d3:6f:67:6d:49:43:89:ea:ae:82:21:86:0b:d3: 18:5b:5b:fe:b8:20:1b:5a:5d:af:e2:c1:ce:ba:43:f1: 6a:1c:6a:79:a9:27:65:cb:4f:34:9e:ed:56:f9:c3:0c: 25:f9:71:91:aa:2c:ec:cd:89:ab:71:15:a2:41:bb:17: c7:c8:23:a3:05:cd:f9:30:48:a8:4c:d0:9a:7c:8a:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:06:e3:1c:95:74:64:d5:6b:0a:13:9a:f7:c3:68:7b: 6c:3e:71:b7:17:2c:06:66:1f:0f:8d:f4:33:98:8b:a7: 79:02:18:a9:e6:38:c4:12:67:7e:7d:d9:ca:82:3b:e2: 1d:20:d5:e5:f2:b0:c8:39:95:e7:2a:ad:3c:2b:b9:ce: 0d:2f:bc:bb:7f:c6:0a:62:c5:d5:8e:d9:e5:ed:4c:ac: 5c:50:cf:13:0a:e5:a5:b0:e2:03:0d:e1:cc:dd:10:66: ea:94:72:93:61:ca:f5:78:99:99:81:72:a9:a4:17:93: c8:82:6f:32:9e:8a:ed:5e:0f:5e:46:48:45:c0:01:a4 Fingerprint (MD5): D9:21:D2:49:3A:AF:92:49:31:5C:3A:FC:D3:03:34:1A Fingerprint (SHA1): FC:1F:00:77:A9:A9:A1:D5:37:C0:1F:B9:92:B3:B9:C8:4C:1E:93:FB Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1712: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173965 (0x1371050d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:39:39 2012 Not After : Sun Mar 26 21:39:39 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:fd:c4:13:45:75:f6:2f:95:6a:cf:2c:83:e4:65:8b: 97:67:62:b7:c5:1d:26:a3:78:76:1b:ae:56:66:9c:22: 59:fa:24:6d:1a:94:e6:5b:00:fb:dc:f1:a6:c7:fc:de: 3b:b5:d3:6f:67:6d:49:43:89:ea:ae:82:21:86:0b:d3: 18:5b:5b:fe:b8:20:1b:5a:5d:af:e2:c1:ce:ba:43:f1: 6a:1c:6a:79:a9:27:65:cb:4f:34:9e:ed:56:f9:c3:0c: 25:f9:71:91:aa:2c:ec:cd:89:ab:71:15:a2:41:bb:17: c7:c8:23:a3:05:cd:f9:30:48:a8:4c:d0:9a:7c:8a:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:06:e3:1c:95:74:64:d5:6b:0a:13:9a:f7:c3:68:7b: 6c:3e:71:b7:17:2c:06:66:1f:0f:8d:f4:33:98:8b:a7: 79:02:18:a9:e6:38:c4:12:67:7e:7d:d9:ca:82:3b:e2: 1d:20:d5:e5:f2:b0:c8:39:95:e7:2a:ad:3c:2b:b9:ce: 0d:2f:bc:bb:7f:c6:0a:62:c5:d5:8e:d9:e5:ed:4c:ac: 5c:50:cf:13:0a:e5:a5:b0:e2:03:0d:e1:cc:dd:10:66: ea:94:72:93:61:ca:f5:78:99:99:81:72:a9:a4:17:93: c8:82:6f:32:9e:8a:ed:5e:0f:5e:46:48:45:c0:01:a4 Fingerprint (MD5): D9:21:D2:49:3A:AF:92:49:31:5C:3A:FC:D3:03:34:1A Fingerprint (SHA1): FC:1F:00:77:A9:A9:A1:D5:37:C0:1F:B9:92:B3:B9:C8:4C:1E:93:FB Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1713: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173965 (0x1371050d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:39:39 2012 Not After : Sun Mar 26 21:39:39 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:fd:c4:13:45:75:f6:2f:95:6a:cf:2c:83:e4:65:8b: 97:67:62:b7:c5:1d:26:a3:78:76:1b:ae:56:66:9c:22: 59:fa:24:6d:1a:94:e6:5b:00:fb:dc:f1:a6:c7:fc:de: 3b:b5:d3:6f:67:6d:49:43:89:ea:ae:82:21:86:0b:d3: 18:5b:5b:fe:b8:20:1b:5a:5d:af:e2:c1:ce:ba:43:f1: 6a:1c:6a:79:a9:27:65:cb:4f:34:9e:ed:56:f9:c3:0c: 25:f9:71:91:aa:2c:ec:cd:89:ab:71:15:a2:41:bb:17: c7:c8:23:a3:05:cd:f9:30:48:a8:4c:d0:9a:7c:8a:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:06:e3:1c:95:74:64:d5:6b:0a:13:9a:f7:c3:68:7b: 6c:3e:71:b7:17:2c:06:66:1f:0f:8d:f4:33:98:8b:a7: 79:02:18:a9:e6:38:c4:12:67:7e:7d:d9:ca:82:3b:e2: 1d:20:d5:e5:f2:b0:c8:39:95:e7:2a:ad:3c:2b:b9:ce: 0d:2f:bc:bb:7f:c6:0a:62:c5:d5:8e:d9:e5:ed:4c:ac: 5c:50:cf:13:0a:e5:a5:b0:e2:03:0d:e1:cc:dd:10:66: ea:94:72:93:61:ca:f5:78:99:99:81:72:a9:a4:17:93: c8:82:6f:32:9e:8a:ed:5e:0f:5e:46:48:45:c0:01:a4 Fingerprint (MD5): D9:21:D2:49:3A:AF:92:49:31:5C:3A:FC:D3:03:34:1A Fingerprint (SHA1): FC:1F:00:77:A9:A9:A1:D5:37:C0:1F:B9:92:B3:B9:C8:4C:1E:93:FB Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1714: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173965 (0x1371050d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:39:39 2012 Not After : Sun Mar 26 21:39:39 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:fd:c4:13:45:75:f6:2f:95:6a:cf:2c:83:e4:65:8b: 97:67:62:b7:c5:1d:26:a3:78:76:1b:ae:56:66:9c:22: 59:fa:24:6d:1a:94:e6:5b:00:fb:dc:f1:a6:c7:fc:de: 3b:b5:d3:6f:67:6d:49:43:89:ea:ae:82:21:86:0b:d3: 18:5b:5b:fe:b8:20:1b:5a:5d:af:e2:c1:ce:ba:43:f1: 6a:1c:6a:79:a9:27:65:cb:4f:34:9e:ed:56:f9:c3:0c: 25:f9:71:91:aa:2c:ec:cd:89:ab:71:15:a2:41:bb:17: c7:c8:23:a3:05:cd:f9:30:48:a8:4c:d0:9a:7c:8a:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:06:e3:1c:95:74:64:d5:6b:0a:13:9a:f7:c3:68:7b: 6c:3e:71:b7:17:2c:06:66:1f:0f:8d:f4:33:98:8b:a7: 79:02:18:a9:e6:38:c4:12:67:7e:7d:d9:ca:82:3b:e2: 1d:20:d5:e5:f2:b0:c8:39:95:e7:2a:ad:3c:2b:b9:ce: 0d:2f:bc:bb:7f:c6:0a:62:c5:d5:8e:d9:e5:ed:4c:ac: 5c:50:cf:13:0a:e5:a5:b0:e2:03:0d:e1:cc:dd:10:66: ea:94:72:93:61:ca:f5:78:99:99:81:72:a9:a4:17:93: c8:82:6f:32:9e:8a:ed:5e:0f:5e:46:48:45:c0:01:a4 Fingerprint (MD5): D9:21:D2:49:3A:AF:92:49:31:5C:3A:FC:D3:03:34:1A Fingerprint (SHA1): FC:1F:00:77:A9:A9:A1:D5:37:C0:1F:B9:92:B3:B9:C8:4C:1E:93:FB Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1715: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1716: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1717: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326173995 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1718: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1719: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1720: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1721: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 326173996 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1722: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der chains.sh: #1723: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1724: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1725: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 326173997 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1726: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der chains.sh: #1727: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1728: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1729: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 326173998 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1730: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der chains.sh: #1731: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1732: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1733: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 326173999 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1734: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der chains.sh: #1735: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1736: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1737: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 326174000 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1738: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der chains.sh: #1739: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1740: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1741: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 326174001 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1742: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der chains.sh: #1743: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1744: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173995 (0x1371052b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:52 2012 Not After : Sun Mar 26 21:39:52 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:ed:54:65:fd:cb:ab:cb:a2:75:f7:33:b8:da:04:19: 5a:d0:a9:a4:53:d5:10:af:d5:ed:f4:90:68:43:f7:cc: 6e:e3:fd:0f:e8:05:8c:4a:e3:70:18:78:6a:83:4c:c2: 5d:5a:98:fe:c5:a4:3c:ce:37:12:cf:c6:3d:65:6b:8d: 71:b6:dd:e2:76:cd:54:26:cb:dc:5d:b0:ad:87:6f:78: 89:c5:0a:dd:5e:5a:42:23:93:a6:2b:aa:e4:bd:2e:4f: c2:d1:90:d1:4f:15:1a:a3:94:80:83:2e:03:0d:24:94: 5c:a0:49:aa:ae:cc:66:40:cf:89:fc:f6:06:23:7c:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 66:92:1c:45:8f:14:88:dd:7b:fb:71:53:a3:b8:7f:f7: 53:02:ac:73:fe:ee:77:2a:d5:39:35:aa:a4:a4:c2:a7: ce:ac:1f:22:4f:1b:c7:36:4d:e5:4b:e3:2b:5f:d2:79: 2a:9f:31:93:50:3d:bc:db:43:b8:58:16:ba:bf:a3:a3: 82:73:f7:fb:06:6e:61:ba:37:c4:23:56:01:dd:df:09: 7c:10:b0:61:6a:b6:41:47:2b:01:2e:38:9d:a7:8f:8c: e9:a1:8a:c9:28:64:07:da:ea:fe:d6:04:0d:d6:da:2e: a9:9d:cc:a6:97:5a:7b:7d:73:c9:ef:e0:8d:f7:d4:32 Fingerprint (MD5): CB:0E:29:06:F2:E4:69:18:EF:7D:83:8A:07:C6:D1:73 Fingerprint (SHA1): B1:8E:20:1A:95:E9:03:69:88:F2:CF:F6:A0:3D:88:CD:5A:F1:CD:83 Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1745: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1746: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1747: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1748: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326173995 (0x1371052b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:52 2012 Not After : Sun Mar 26 21:39:52 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:ed:54:65:fd:cb:ab:cb:a2:75:f7:33:b8:da:04:19: 5a:d0:a9:a4:53:d5:10:af:d5:ed:f4:90:68:43:f7:cc: 6e:e3:fd:0f:e8:05:8c:4a:e3:70:18:78:6a:83:4c:c2: 5d:5a:98:fe:c5:a4:3c:ce:37:12:cf:c6:3d:65:6b:8d: 71:b6:dd:e2:76:cd:54:26:cb:dc:5d:b0:ad:87:6f:78: 89:c5:0a:dd:5e:5a:42:23:93:a6:2b:aa:e4:bd:2e:4f: c2:d1:90:d1:4f:15:1a:a3:94:80:83:2e:03:0d:24:94: 5c:a0:49:aa:ae:cc:66:40:cf:89:fc:f6:06:23:7c:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 66:92:1c:45:8f:14:88:dd:7b:fb:71:53:a3:b8:7f:f7: 53:02:ac:73:fe:ee:77:2a:d5:39:35:aa:a4:a4:c2:a7: ce:ac:1f:22:4f:1b:c7:36:4d:e5:4b:e3:2b:5f:d2:79: 2a:9f:31:93:50:3d:bc:db:43:b8:58:16:ba:bf:a3:a3: 82:73:f7:fb:06:6e:61:ba:37:c4:23:56:01:dd:df:09: 7c:10:b0:61:6a:b6:41:47:2b:01:2e:38:9d:a7:8f:8c: e9:a1:8a:c9:28:64:07:da:ea:fe:d6:04:0d:d6:da:2e: a9:9d:cc:a6:97:5a:7b:7d:73:c9:ef:e0:8d:f7:d4:32 Fingerprint (MD5): CB:0E:29:06:F2:E4:69:18:EF:7D:83:8A:07:C6:D1:73 Fingerprint (SHA1): B1:8E:20:1A:95:E9:03:69:88:F2:CF:F6:A0:3D:88:CD:5A:F1:CD:83 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1749: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1750: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1751: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1752: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174002 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1753: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1754: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1755: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1756: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174003 --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1757: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1758: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1759: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1760: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174004 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1761: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1762: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1763: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1764: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326174005 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1765: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #1766: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1767: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1768: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1769: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1770: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174002 (0x13710532) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:55 2012 Not After : Sun Mar 26 21:39:55 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:10:7e:f4:a1:92:df:40:26:1b:c0:e9:f4:61:b3:36: 3c:50:c0:c9:e3:37:0c:be:e5:62:42:d0:7c:21:bf:aa: a4:f5:9c:d2:63:b7:01:4b:05:4b:01:20:c3:fc:3b:17: e4:0f:d6:41:58:19:b9:e3:50:50:db:99:3b:49:8e:03: 79:db:58:c0:6e:07:11:09:d8:8c:3f:88:22:d0:38:d3: dc:5f:38:37:56:6c:52:62:d7:29:b1:53:2a:e3:a5:3b: f0:02:bf:d5:d8:33:3c:cc:b3:3e:44:70:26:a3:c1:ef: fe:6e:a7:f5:f6:b0:46:3c:be:9e:a9:6e:82:4f:08:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 11:39:49:5e:31:db:0c:87:ec:1f:ba:83:1f:c0:ad:0b: 14:69:cb:03:07:a6:bc:0f:54:b2:1e:d3:6d:53:b8:ca: ae:cb:bd:f5:16:62:b1:d2:ef:1c:d1:50:07:9e:74:71: bf:9a:de:62:31:88:9d:c8:7e:1d:8a:d7:5f:4e:37:08: 59:08:59:31:19:78:2c:b8:cf:74:b2:23:9b:00:e9:f5: 55:a0:25:35:8f:c5:a4:4a:9e:bc:e4:0c:1a:fb:c2:5c: 25:4b:cb:f2:f7:7f:ff:76:2b:3f:5f:58:9e:37:9c:89: 54:59:3b:08:87:3b:c2:d8:f6:b2:99:41:58:54:f9:af Fingerprint (MD5): 9A:D5:7F:C7:F1:1A:5D:3A:B0:FD:82:16:82:CD:2E:4B Fingerprint (SHA1): EC:66:0D:D7:4C:57:46:7D:41:8D:DD:86:86:EC:97:0A:AC:B0:53:C9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1771: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1772: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1773: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174003 (0x13710533) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:56 2012 Not After : Sun Mar 26 21:39:56 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:7a:c8:8a:a9:28:36:cd:8d:08:89:fe:64:fc:98:45: 29:b6:06:33:4d:9a:56:d1:e2:9b:b1:82:48:b5:25:f1: bf:ea:d1:c3:73:bf:55:c9:ec:c5:22:d2:09:52:4f:0f: 5f:05:e3:35:b5:3f:43:38:61:2e:7e:3c:6c:ce:f5:9a: c6:54:a7:36:b8:34:9e:72:31:b0:99:c8:44:12:18:af: fc:5d:99:06:ff:98:f2:55:17:23:b0:b9:81:a0:16:dc: 1d:a8:49:60:21:3a:79:5c:39:2e:53:01:0c:c8:3a:c7: a0:54:a8:81:90:8b:fb:eb:4a:43:47:7e:35:6a:8b:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:f6:e9:63:27:3a:6c:5a:2c:ea:31:46:81:a3:ec:82: 9c:28:69:8a:56:1b:36:ad:3e:14:80:26:b5:4e:2b:1b: 3f:9e:71:29:ad:05:b4:1e:31:d6:c1:89:c6:11:9a:da: 2f:ef:48:ca:c9:a4:c3:d3:cc:00:db:fa:46:aa:51:03: b4:68:41:4c:ed:4e:c7:91:df:af:e8:d2:a7:16:2b:02: 18:c5:7c:5c:74:bc:ad:9c:f1:0f:4d:81:be:63:52:19: bd:0c:02:d1:35:b5:24:c0:e0:28:41:7a:c3:f4:95:3a: cc:30:21:a7:dc:83:88:05:7a:79:49:63:77:f8:48:f4 Fingerprint (MD5): 1C:34:E8:C6:8A:1B:25:19:D5:62:9F:1B:E3:C4:B2:54 Fingerprint (SHA1): 06:B4:1A:9C:89:D7:D1:E2:44:78:4E:07:7B:24:E1:48:71:37:AB:EC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1774: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1775: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174004 (0x13710534) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:39:56 2012 Not After : Sun Mar 26 21:39:56 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:6f:d1:66:b1:3c:c6:ec:7a:62:a8:de:19:75:e1:2a: bb:31:cf:2a:43:38:d6:a8:ee:cf:b9:0d:4f:2f:9f:1c: b1:69:5f:1b:74:87:17:d5:0b:4f:b2:48:c9:5d:6a:d1: 6b:44:ac:f4:7e:fe:12:d1:7d:fe:2c:56:7c:84:95:12: c4:7e:30:46:27:e6:54:e7:21:43:71:98:fc:6d:ed:eb: 34:4f:6a:6b:e9:08:60:f4:96:d4:da:72:fd:8c:31:ce: f2:6d:2b:bf:ee:8b:20:93:60:7e:70:36:3d:11:59:cd: f2:04:40:85:1c:32:5f:57:95:1e:81:ba:2f:c3:ac:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:b4:5e:d3:d5:ec:cf:94:1e:45:4c:c1:2f:9f:a3:b9: 93:d8:42:3f:01:d5:8b:1a:d5:e6:e5:71:b8:19:be:7a: fc:4f:38:c4:5e:82:4c:a9:77:c6:f5:1a:38:f9:25:a5: a5:ef:78:f1:0b:b0:e6:92:d5:88:e7:0a:a8:44:b7:21: 41:08:44:6f:6c:30:46:83:14:18:60:dd:e1:51:12:c0: e6:dd:f0:9e:8e:50:66:1d:30:ea:49:48:57:81:59:6a: 09:a9:a1:7e:98:14:5f:8f:07:ac:78:0c:7f:1c:bd:1e: 00:17:29:2e:5a:0a:4b:9c:34:e7:8d:f8:73:a1:f6:a4 Fingerprint (MD5): 6F:66:CC:06:39:5A:12:F0:EA:D5:4F:96:58:AE:3E:89 Fingerprint (SHA1): 11:15:94:4A:44:5A:A5:6A:7F:5C:A0:A0:54:E5:71:10:32:F3:7D:C3 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1776: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1777: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174006 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1778: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1779: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1780: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1781: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174007 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1782: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1783: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1784: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1785: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174008 --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1786: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1787: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1788: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1789: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 326174009 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1790: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der chains.sh: #1791: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1792: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1793: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 326174010 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1794: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der chains.sh: #1795: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1796: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1797: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1798: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1799: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1800: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174006 (0x13710536) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:58 2012 Not After : Sun Mar 26 21:39:58 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:dd:29:79:27:be:ca:67:b7:e9:1d:ff:2b:e7:ac:ff: 7e:f7:ae:9d:d9:95:fe:35:6b:41:d9:32:95:3c:66:b7: 6e:31:5e:bb:cb:76:ad:ed:62:15:34:b0:85:38:fa:da: f2:86:6f:08:35:54:24:6f:40:c3:09:8f:f1:34:3c:3d: 7f:99:71:6b:79:04:84:84:49:a9:0d:1c:88:38:c6:65: 4f:15:d7:72:dc:35:5e:e8:e2:5f:e8:43:30:32:ea:6d: 44:f3:c2:a7:e9:89:b1:de:a5:51:e3:58:95:0f:55:bf: 62:8a:2a:f8:2f:1d:e2:9a:56:99:5b:69:27:a0:b2:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 4f:2d:50:35:35:15:ef:d0:84:c9:4f:1c:4d:5d:89:6b: 15:78:a0:70:1c:83:19:40:96:cb:b2:e3:07:cc:16:4b: c5:42:70:1f:1d:a6:b9:5e:c6:70:ea:6f:53:08:18:78: 10:00:f3:5d:14:85:40:de:7a:b0:89:4b:47:d5:02:cd: 49:a4:89:65:ac:61:55:07:12:30:95:5c:3e:8f:ab:a1: bc:ee:3c:1a:21:83:a8:ef:05:55:d8:16:1a:4a:fb:f0: 53:68:43:45:e0:5e:3b:94:f7:ae:0c:09:56:6b:f0:7c: 5f:ff:49:ae:73:f2:0b:58:cf:f1:d2:95:c8:65:83:28 Fingerprint (MD5): 35:10:81:D1:93:02:4A:BD:82:1D:C2:85:C0:5B:93:93 Fingerprint (SHA1): 09:8B:79:0A:AE:C3:F9:DE:09:AE:22:1E:96:62:D9:FE:01:77:88:EC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1801: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1802: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174007 (0x13710537) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:39:58 2012 Not After : Sun Mar 26 21:39:58 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:07:36:d4:9b:b0:63:2d:4d:b9:e5:11:df:5e:d2:22: a1:6a:f5:ca:1b:20:67:cf:bf:5f:1c:a9:b7:65:84:d6: 54:87:8a:cc:b1:09:b7:7c:cd:ba:2f:92:5e:fd:b8:18: ca:23:5c:e4:36:cc:43:cc:6e:9e:13:e4:70:99:75:4c: dd:ce:a7:7b:ef:af:04:55:f8:d3:4c:c9:e4:e4:b1:e6: 4b:aa:20:93:78:24:90:26:3d:03:35:1f:ac:be:36:ff: df:66:ad:ec:6f:f0:6e:09:d4:e3:d5:41:41:4e:95:9c: d7:20:be:5f:85:46:2f:7b:01:ff:45:ec:b2:a4:43:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b4:63:97:d9:9d:d7:1b:4d:59:94:61:e6:b4:40:05:0a: 39:d9:2f:4d:2f:d6:a7:21:1e:64:8b:ad:09:76:20:31: 74:6a:1c:c7:f9:27:28:d3:d2:63:98:82:98:1d:c5:70: d9:68:58:5a:25:7e:68:be:4f:eb:e3:b8:fa:1f:89:3b: 65:fd:ff:16:e4:7b:38:59:75:5a:34:35:e2:2b:ef:44: fd:11:26:99:35:80:ae:d4:12:6e:96:e7:1d:ec:1a:ca: 6b:6b:ef:7c:ff:37:90:36:71:1b:e0:9a:66:c3:14:2f: 44:fe:61:5a:b1:98:22:3d:b3:24:e3:99:fc:5a:e0:a1 Fingerprint (MD5): CC:F7:9B:A7:7A:C6:A9:92:CB:42:31:E4:E8:69:5A:91 Fingerprint (SHA1): 02:C6:07:81:EE:78:31:E2:D9:FD:5D:BE:FA:C7:6F:80:FC:57:76:2E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1803: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1804: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1805: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174008 (0x13710538) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:39:58 2012 Not After : Sun Mar 26 21:39:58 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:18:c4:ce:1a:26:81:d5:70:43:34:75:69:87:67:a1: 8f:40:dd:6b:15:c6:97:68:a6:e8:0e:60:94:20:47:33: 8d:39:31:7c:bb:24:50:f1:42:30:69:9e:bb:ac:7f:cf: 1c:56:88:33:77:25:1d:18:ae:df:41:13:a9:ee:1a:ae: 7a:71:b5:ef:dc:ed:ec:da:bd:c5:9e:1a:97:3a:37:bc: b5:bb:b5:12:29:cb:fb:bc:6b:40:d4:d3:6b:cd:ea:3d: bd:a5:51:72:6b:f2:54:7f:8a:d2:15:c8:cc:b2:a4:a0: 55:f2:d3:0e:6e:f2:ff:6f:ca:4e:bb:da:8c:64:e4:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 36:4e:21:b6:7c:9c:8d:9f:e0:19:1a:78:8f:7c:2c:1d: c3:70:b0:19:31:95:cf:20:e6:6c:1d:46:77:ec:5a:37: 8d:f2:6e:33:5e:e2:f2:38:62:52:be:30:18:f5:53:fa: 5e:fc:e1:a5:ad:62:3d:78:88:48:a2:fc:7a:06:25:f6: f0:a2:2d:4e:eb:a6:79:cf:c1:9f:54:d4:29:bf:be:52: 60:ed:5b:da:6c:c5:44:59:f2:bc:7b:20:b8:75:d2:28: 0d:76:00:93:eb:df:f8:70:69:35:02:8e:e9:2a:7c:15: 75:78:14:86:cd:79:fb:0d:67:ec:6a:6c:55:f8:a1:51 Fingerprint (MD5): A4:25:9A:40:0F:6B:75:F3:90:87:02:4C:A0:4E:87:6C Fingerprint (SHA1): 7B:4C:2B:BC:AC:D6:7C:1B:19:B3:BB:A4:27:8D:BB:75:8B:D7:34:C8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1806: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1807: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174011 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1808: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1809: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1810: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1811: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174012 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1812: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1813: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1814: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1815: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174013 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-30287-CA1Root-326173921.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1816: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1817: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1818: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1819: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326174014 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1820: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #1821: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1822: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1823: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174015 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1824: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1825: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1826: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174016 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1827: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1828: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1829: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1830: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326174017 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1831: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #1832: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326174018 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1833: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #1834: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1835: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1836: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1837: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326174019 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-30287-Bridge-326173922.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1838: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #1839: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1840: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1841: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174020 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1842: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #1843: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1844: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1845: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174021 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1846: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1847: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1848: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174022 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1849: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1850: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1851: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1852: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326174023 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1853: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #1854: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326174024 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1855: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #1856: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1857: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1858: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1859: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326174025 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-30287-Bridge-326173923.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1860: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #1861: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1862: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1863: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174026 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1864: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #1865: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1866: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1867: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 326174027 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-30287-BridgeNavy-326173924.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1868: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #1869: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1870: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1871: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326174028 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1872: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #1873: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1874: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1875: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174029 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1876: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1877: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1878: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174030 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1879: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1880: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1881: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1882: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 326174031 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1883: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der chains.sh: #1884: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1885: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1886: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 326174032 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1887: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der chains.sh: #1888: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1889: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1890: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 326174033 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1891: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der chains.sh: #1892: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 326174034 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1893: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der chains.sh: #1894: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1895: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1896: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1897: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326174035 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1898: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #1899: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1900: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1901: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 326174036 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1902: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #1903: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1904: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1905: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174037 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1906: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #1907: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1908: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1909: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326174038 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1910: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #1911: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1912: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174029 (0x1371054d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:40:07 2012 Not After : Sun Mar 26 21:40:07 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:e5:b8:4d:21:5a:44:dc:55:93:68:4a:97:7f:bf:e3: e7:82:b7:e0:33:a8:be:36:c8:cd:ca:12:bf:3a:18:65: 11:f6:7b:3c:52:ac:d9:5e:93:18:ef:c4:4a:31:fd:5d: 86:4d:6e:7f:19:0c:2e:8b:28:00:ff:0b:d2:37:1a:e7: 28:64:0b:6b:2b:60:66:cb:13:00:bd:68:2b:54:b2:84: ec:4f:22:cf:f3:fb:e1:56:dc:5c:68:31:6d:f5:39:9a: 66:6e:2f:73:50:f8:cf:e3:1a:53:96:21:26:19:c5:e5: f2:1e:75:3f:f3:7c:9a:ba:db:e1:b3:7c:1c:29:7e:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 0b:b4:99:13:d9:21:6f:03:5c:ab:75:02:ab:66:0e:d5: ce:39:b0:9c:95:4e:69:88:0d:c0:82:f8:53:0d:da:3e: c2:2b:fa:bb:ad:e7:c6:7b:a9:c5:44:07:66:ee:7e:71: 86:ef:50:4e:e2:7b:c7:a3:ad:28:87:9f:0f:da:90:ba: d4:ea:60:5f:3c:7a:92:45:87:84:26:f7:cb:0d:d2:a1: e2:d9:c9:44:43:df:d3:7f:a4:b7:9b:38:4e:07:ca:1d: e9:2b:fb:3b:c1:67:3f:81:96:42:87:6d:5f:91:d9:54: 55:2a:a2:28:41:49:da:8d:44:d7:ab:74:d3:32:76:6a Fingerprint (MD5): D9:C0:F1:97:98:59:CC:00:CC:91:BA:59:D6:B1:50:1D Fingerprint (SHA1): 34:5C:21:CC:75:3B:2A:5B:2F:AC:1E:43:FE:52:31:B1:A1:52:CF:93 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1913: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1914: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1915: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1916: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1917: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1918: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1919: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1920: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1921: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174030 (0x1371054e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:40:07 2012 Not After : Sun Mar 26 21:40:07 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:0c:b8:02:f0:ea:54:6f:99:31:16:9c:f3:f5:88:e1: e9:dd:44:ff:ad:f1:24:a5:b7:a6:0a:c1:0e:13:7b:2e: 0d:96:65:74:4a:df:6c:e6:fb:de:d0:0b:ef:73:6f:0f: e5:7e:c4:4d:c6:7e:78:85:50:e9:46:3f:9f:4e:6d:1c: f5:78:cb:d7:44:37:b7:76:ab:ca:31:aa:b9:2d:25:a0: a3:be:bd:3f:a6:f6:be:4b:38:28:f7:cd:f7:23:61:a4: 30:93:18:1d:5a:4f:61:e0:6d:5f:01:77:4c:53:2e:b1: 71:34:4d:9a:ef:00:3f:cb:59:ef:09:ac:6c:12:e5:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 57:da:fa:66:b7:ad:10:69:b4:b2:16:24:b3:2b:f8:99: 27:59:dc:bc:d2:9c:99:d6:85:cc:08:93:f1:de:ac:fb: bd:b7:2f:bb:38:12:02:a5:05:0a:e0:59:0a:58:a5:a6: 1b:4f:14:77:1d:d7:17:1e:2a:5a:61:92:fc:4c:d3:68: 0b:38:0c:11:72:2f:b8:f4:43:91:11:30:a6:52:2f:f9: 1f:5c:42:79:db:52:3e:0a:31:10:8e:91:5f:87:55:e8: c7:28:74:ef:16:a6:f1:93:2f:f6:84:25:b9:4e:4e:74: aa:c2:85:49:97:40:a6:85:75:a3:2d:33:fd:7f:66:06 Fingerprint (MD5): 8A:23:33:A2:47:AD:BA:28:76:48:01:02:24:3D:F8:40 Fingerprint (SHA1): 2B:DC:94:02:6A:8F:89:D7:03:F6:B5:8B:C9:11:9F:82:9D:E0:CA:FE Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1922: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1923: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1924: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1925: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1926: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1927: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1928: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1929: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1930: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1931: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1932: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1933: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1934: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1935: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1936: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1937: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.113733.1.7.23.6 /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig n, Inc.",C=US" Validity: Not Before: Wed Nov 08 00:00:00 2006 Not After : Sun Nov 07 23:59:59 2021 Subject: "CN=VeriSign Class 3 Public Primary Certification Authority - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve riSign Trust Network,O="VeriSign, Inc.",C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc: 7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64: 85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42: b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec: ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3: 62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b: 9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f: e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db: 7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af: 1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a: b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7: ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74: 24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4: 8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95: ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f: 73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: CRL Distribution Points Distribution point: URI: "http://crl.verisign.com/pca3.crl" Name: Certificate Key Usage Critical: True Usages: Certificate Signing CRL Signing Name: OID.1.3.6.1.5.5.7.1.12 Data: Sequence { [1]: { [0]: { Sequence { Sequence { Sequence { "image/gif" Sequence { Sequence { Sequence { SHA-1 } 8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf: 80:6a:d4:48:18:2c:7b:19:2e } } Sequence { "http://logo.verisign.com/vslogo.gif" } } } } } } } Name: Certificate Policies Data: Policy Name: Certificate Policies AnyPolicy Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Qualifier Data: "https://www.verisign.com/cps" Name: Certificate Subject Key ID Data: 7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02: af:33:31:33 Name: Certificate Authority Key Identifier Issuer: Directory Name: "OU=Class 3 Public Primary Certification Auth ority,O="VeriSign, Inc.",C=US" Serial Number: 70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a: f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31: 47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c: d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0: ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d: 5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a: 84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1: d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6 Fingerprint (MD5): C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C Fingerprint (SHA1): 87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C= US,serialNumber=3014267,businessCategory=Private Organization,incorporati onState=Delaware,incorporationCountry=US" Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network ,O="VeriSign, Inc.",C=US" Returned value is 0, expected result is pass chains.sh: #1938: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1939: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1940: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174039 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1941: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1942: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1943: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1944: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174040 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1945: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1946: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1947: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1948: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174041 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1949: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #1950: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1951: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1952: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 326174042 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1953: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der chains.sh: #1954: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1955: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1956: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326174043 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1957: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #1958: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1959: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1960: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 326174044 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1961: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der chains.sh: #1962: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1963: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1964: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 326174045 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1965: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der chains.sh: #1966: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1967: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1968: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 326174046 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1969: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der chains.sh: #1970: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1971: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1972: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 326174047 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1973: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der chains.sh: #1974: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1975: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174039 (0x13710557) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:40:13 2012 Not After : Sun Mar 26 21:40:13 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 82:8c:c8:68:2e:87:a3:be:1c:b9:76:19:77:24:89:e0: d6:fb:60:f2:b8:eb:ca:23:94:e4:8a:2f:42:81:6e:74: 89:cb:78:9f:ef:cc:63:bd:b4:ec:e3:db:96:70:8f:59: 09:4c:03:0a:63:3f:a0:97:22:7c:1e:29:13:53:ab:b0: 6a:a9:3c:58:b9:a1:8d:6b:49:2c:b0:a2:0d:97:07:d0: 05:4f:d9:fb:84:64:49:55:2d:e6:58:4b:13:69:1f:a3: e2:63:96:95:58:23:7a:80:29:e6:e3:05:70:b6:73:3c: 19:4e:1e:59:db:0a:08:cf:96:a7:90:a7:a1:45:7f:e1 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:15:00:8a:d3:00:92:c4:cb:69:dd:37:cc:47: 3d:be:84:5b:49:cc:77:fa:58:02:14:3e:0f:90:20:d8: dc:a5:3c:34:2a:eb:7c:fd:84:83:69:05:fd:d9:f8 Fingerprint (MD5): A5:2A:F7:F1:C8:E9:FF:79:52:98:C8:EF:CB:16:36:BF Fingerprint (SHA1): FB:B2:48:0A:A9:25:46:2C:AA:8E:8F:C0:68:22:B9:47:2E:CD:5A:66 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1976: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174039 (0x13710557) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:40:13 2012 Not After : Sun Mar 26 21:40:13 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 82:8c:c8:68:2e:87:a3:be:1c:b9:76:19:77:24:89:e0: d6:fb:60:f2:b8:eb:ca:23:94:e4:8a:2f:42:81:6e:74: 89:cb:78:9f:ef:cc:63:bd:b4:ec:e3:db:96:70:8f:59: 09:4c:03:0a:63:3f:a0:97:22:7c:1e:29:13:53:ab:b0: 6a:a9:3c:58:b9:a1:8d:6b:49:2c:b0:a2:0d:97:07:d0: 05:4f:d9:fb:84:64:49:55:2d:e6:58:4b:13:69:1f:a3: e2:63:96:95:58:23:7a:80:29:e6:e3:05:70:b6:73:3c: 19:4e:1e:59:db:0a:08:cf:96:a7:90:a7:a1:45:7f:e1 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:15:00:8a:d3:00:92:c4:cb:69:dd:37:cc:47: 3d:be:84:5b:49:cc:77:fa:58:02:14:3e:0f:90:20:d8: dc:a5:3c:34:2a:eb:7c:fd:84:83:69:05:fd:d9:f8 Fingerprint (MD5): A5:2A:F7:F1:C8:E9:FF:79:52:98:C8:EF:CB:16:36:BF Fingerprint (SHA1): FB:B2:48:0A:A9:25:46:2C:AA:8E:8F:C0:68:22:B9:47:2E:CD:5A:66 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1977: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174039 (0x13710557) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:40:13 2012 Not After : Sun Mar 26 21:40:13 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 82:8c:c8:68:2e:87:a3:be:1c:b9:76:19:77:24:89:e0: d6:fb:60:f2:b8:eb:ca:23:94:e4:8a:2f:42:81:6e:74: 89:cb:78:9f:ef:cc:63:bd:b4:ec:e3:db:96:70:8f:59: 09:4c:03:0a:63:3f:a0:97:22:7c:1e:29:13:53:ab:b0: 6a:a9:3c:58:b9:a1:8d:6b:49:2c:b0:a2:0d:97:07:d0: 05:4f:d9:fb:84:64:49:55:2d:e6:58:4b:13:69:1f:a3: e2:63:96:95:58:23:7a:80:29:e6:e3:05:70:b6:73:3c: 19:4e:1e:59:db:0a:08:cf:96:a7:90:a7:a1:45:7f:e1 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:15:00:8a:d3:00:92:c4:cb:69:dd:37:cc:47: 3d:be:84:5b:49:cc:77:fa:58:02:14:3e:0f:90:20:d8: dc:a5:3c:34:2a:eb:7c:fd:84:83:69:05:fd:d9:f8 Fingerprint (MD5): A5:2A:F7:F1:C8:E9:FF:79:52:98:C8:EF:CB:16:36:BF Fingerprint (SHA1): FB:B2:48:0A:A9:25:46:2C:AA:8E:8F:C0:68:22:B9:47:2E:CD:5A:66 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1978: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174039 (0x13710557) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:40:13 2012 Not After : Sun Mar 26 21:40:13 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 82:8c:c8:68:2e:87:a3:be:1c:b9:76:19:77:24:89:e0: d6:fb:60:f2:b8:eb:ca:23:94:e4:8a:2f:42:81:6e:74: 89:cb:78:9f:ef:cc:63:bd:b4:ec:e3:db:96:70:8f:59: 09:4c:03:0a:63:3f:a0:97:22:7c:1e:29:13:53:ab:b0: 6a:a9:3c:58:b9:a1:8d:6b:49:2c:b0:a2:0d:97:07:d0: 05:4f:d9:fb:84:64:49:55:2d:e6:58:4b:13:69:1f:a3: e2:63:96:95:58:23:7a:80:29:e6:e3:05:70:b6:73:3c: 19:4e:1e:59:db:0a:08:cf:96:a7:90:a7:a1:45:7f:e1 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:15:00:8a:d3:00:92:c4:cb:69:dd:37:cc:47: 3d:be:84:5b:49:cc:77:fa:58:02:14:3e:0f:90:20:d8: dc:a5:3c:34:2a:eb:7c:fd:84:83:69:05:fd:d9:f8 Fingerprint (MD5): A5:2A:F7:F1:C8:E9:FF:79:52:98:C8:EF:CB:16:36:BF Fingerprint (SHA1): FB:B2:48:0A:A9:25:46:2C:AA:8E:8F:C0:68:22:B9:47:2E:CD:5A:66 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1979: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1980: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1981: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1982: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1983: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1984: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1985: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #1986: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1987: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1988: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1989: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #1990: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1991: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1992: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1993: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #1994: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1995: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1996: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1997: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der chains.sh: #1998: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1999: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2000: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2001: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #2002: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #2003: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2004: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2005: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #2006: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20120326214018Z nextupdate=20130326214018Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 26 21:40:18 2012 Next Update: Tue Mar 26 21:40:18 2013 CRL Extensions: chains.sh: #2007: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214018Z nextupdate=20130326214018Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:40:18 2012 Next Update: Tue Mar 26 21:40:18 2013 CRL Extensions: chains.sh: #2008: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326214018Z nextupdate=20130326214018Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:40:18 2012 Next Update: Tue Mar 26 21:40:18 2013 CRL Extensions: chains.sh: #2009: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20120326214018Z nextupdate=20130326214018Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 26 21:40:18 2012 Next Update: Tue Mar 26 21:40:18 2013 CRL Extensions: chains.sh: #2010: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326214019Z addcert 14 20120326214019Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:40:19 2012 Next Update: Tue Mar 26 21:40:18 2013 Entry (1): Serial Number: 14 (0xe) Revocation Date: Mon Mar 26 21:40:19 2012 CRL Extensions: chains.sh: #2011: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214020Z addcert 15 20120326214020Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:40:20 2012 Next Update: Tue Mar 26 21:40:18 2013 Entry (1): Serial Number: 15 (0xf) Revocation Date: Mon Mar 26 21:40:20 2012 CRL Extensions: chains.sh: #2012: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2013: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2014: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #2015: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #2016: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #2017: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #2018: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #2019: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #2020: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #2021: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:40:16 2012 Not After : Sun Mar 26 21:40:16 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:df:12:f9:58:6e:29:c8:ba:f6:af:83:f0:fe:c2:32: 62:06:5b:81:0d:78:76:02:4c:a2:e9:56:0d:71:99:07: 12:dc:ed:ea:ef:f3:00:92:b3:52:2c:b2:a3:2a:19:72: e2:87:0f:d2:3c:a6:f6:ac:65:f2:04:3b:60:8b:5f:c2: b3:76:49:5e:ed:b7:32:86:9c:cc:d7:dc:6d:82:4c:35: 7d:44:9d:2b:6e:63:1e:fc:55:cb:99:cb:ee:1f:45:06: 15:39:56:20:b2:87:3a:e6:e2:58:df:f4:0a:ea:18:7f: ef:4c:91:c2:18:83:4a:ba:0d:85:df:92:1d:9f:d4:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8e:17:6f:2c:b8:06:8b:28:aa:f5:95:bc:e7:6a:fa:df: 92:58:67:d4:2f:12:41:eb:d3:72:e7:59:3b:51:31:65: 65:fa:b4:5c:db:0a:67:04:73:16:b4:48:a0:0f:5b:e5: 81:3c:4f:22:e7:78:1b:e1:70:69:ae:64:a3:52:64:26: 14:26:fb:3a:cf:ce:9d:c7:f4:f9:b1:60:49:c3:be:f4: 11:e0:47:24:96:0e:e7:30:30:9a:d9:b1:b3:89:18:c3: cb:be:6d:cf:fb:12:06:d0:ec:64:c5:17:b1:b7:b0:b4: 5f:c4:c1:60:1a:70:26:2b:3a:50:c3:a3:b9:a6:ec:7f Fingerprint (MD5): 27:31:70:00:13:E4:74:8F:34:3B:1A:BD:78:4E:54:52 Fingerprint (SHA1): 5C:DB:EF:A3:42:76:B3:AB:98:86:59:1D:F9:2D:7B:A8:7D:18:25:42 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2022: Revocation: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2023: Revocation: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:40:16 2012 Not After : Sun Mar 26 21:40:16 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:df:12:f9:58:6e:29:c8:ba:f6:af:83:f0:fe:c2:32: 62:06:5b:81:0d:78:76:02:4c:a2:e9:56:0d:71:99:07: 12:dc:ed:ea:ef:f3:00:92:b3:52:2c:b2:a3:2a:19:72: e2:87:0f:d2:3c:a6:f6:ac:65:f2:04:3b:60:8b:5f:c2: b3:76:49:5e:ed:b7:32:86:9c:cc:d7:dc:6d:82:4c:35: 7d:44:9d:2b:6e:63:1e:fc:55:cb:99:cb:ee:1f:45:06: 15:39:56:20:b2:87:3a:e6:e2:58:df:f4:0a:ea:18:7f: ef:4c:91:c2:18:83:4a:ba:0d:85:df:92:1d:9f:d4:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8e:17:6f:2c:b8:06:8b:28:aa:f5:95:bc:e7:6a:fa:df: 92:58:67:d4:2f:12:41:eb:d3:72:e7:59:3b:51:31:65: 65:fa:b4:5c:db:0a:67:04:73:16:b4:48:a0:0f:5b:e5: 81:3c:4f:22:e7:78:1b:e1:70:69:ae:64:a3:52:64:26: 14:26:fb:3a:cf:ce:9d:c7:f4:f9:b1:60:49:c3:be:f4: 11:e0:47:24:96:0e:e7:30:30:9a:d9:b1:b3:89:18:c3: cb:be:6d:cf:fb:12:06:d0:ec:64:c5:17:b1:b7:b0:b4: 5f:c4:c1:60:1a:70:26:2b:3a:50:c3:a3:b9:a6:ec:7f Fingerprint (MD5): 27:31:70:00:13:E4:74:8F:34:3B:1A:BD:78:4E:54:52 Fingerprint (SHA1): 5C:DB:EF:A3:42:76:B3:AB:98:86:59:1D:F9:2D:7B:A8:7D:18:25:42 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2024: Revocation: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2025: Revocation: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED ./chains.sh: line 806: ping: command not found OCSP server not accessible, skipping OCSP tests chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2026: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -m 326174048 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2027: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2028: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #2029: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2030: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 326174049 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2031: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #2032: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2033: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 /localhost-30287-CA0-326173938.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2034: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-30287-CA0Root-326173925.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2035: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #2036: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #2037: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-30287-CA0-326173938.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2038: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 326174050 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2039: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #2040: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2041: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 /localhost-30287-CA0-326173938.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2042: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-30287-CA0Root-326173926.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2043: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #2044: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #2045: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2046: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 326174051 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2047: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #2048: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2049: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-30287-CA0-326173938.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2050: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-30287-CA0Root-326173927.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2051: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der chains.sh: #2052: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2053: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-30287-CA0-326173938.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2054: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-30287-CA0Root-326173928.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2055: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der chains.sh: #2056: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20120326214025Z nextupdate=20130326214025Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 26 21:40:25 2012 Next Update: Tue Mar 26 21:40:25 2013 CRL Extensions: chains.sh: #2057: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214025Z nextupdate=20130326214025Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:40:25 2012 Next Update: Tue Mar 26 21:40:25 2013 CRL Extensions: chains.sh: #2058: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326214025Z nextupdate=20130326214025Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:40:25 2012 Next Update: Tue Mar 26 21:40:25 2013 CRL Extensions: chains.sh: #2059: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20120326214025Z nextupdate=20130326214025Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 26 21:40:25 2012 Next Update: Tue Mar 26 21:40:25 2013 CRL Extensions: chains.sh: #2060: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214026Z addcert 20 20120326214026Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:40:26 2012 Next Update: Tue Mar 26 21:40:25 2013 Entry (1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 26 21:40:26 2012 CRL Extensions: chains.sh: #2061: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214027Z addcert 40 20120326214027Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:40:27 2012 Next Update: Tue Mar 26 21:40:25 2013 Entry (1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 26 21:40:26 2012 Entry (2): Serial Number: 40 (0x28) Revocation Date: Mon Mar 26 21:40:27 2012 CRL Extensions: chains.sh: #2062: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2063: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2064: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #2065: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined TIMESTAMP chains END: Mon Mar 26 17:40:27 EDT 2012 chains.sh: Testing with PKIX =============================== Running tests for libpkix TIMESTAMP libpkix BEGIN: Mon Mar 26 17:40:27 EDT 2012 TIMESTAMP libpkix END: Mon Mar 26 17:40:27 EDT 2012 Running tests for cert TIMESTAMP cert BEGIN: Mon Mar 26 17:40:27 EDT 2012 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #2066: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -f ../tests.pw cert.sh: #2067: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2068: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2069: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #2070: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -f ../tests.pw cert.sh: #2071: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2072: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2073: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #2074: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2075: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #2076: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2077: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #2078: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -f ../tests.pw cert.sh: #2079: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2080: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2081: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #2082: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2083: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #2084: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2085: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #2086: Exporting Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw cert.sh: #2087: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2088: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2089: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #2090: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #2091: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #2092: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #2093: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA.ca.cert cert.sh: #2094: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA.ca.cert cert.sh: #2095: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw cert.sh: #2096: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2097: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2098: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #2099: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert cert.sh: #2100: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #2101: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #2102: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA.ca.cert cert.sh: #2103: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA.ca.cert cert.sh: #2104: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw cert.sh: #2105: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2106: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA.ca.cert cert.sh: #2107: Import Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2108: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #2109: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser.cert cert.sh: #2110: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #2111: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2112: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA.ca.cert cert.sh: #2113: Import Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2114: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #2115: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #2116: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2117: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #2118: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain.cert cert.sh: #2119: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #2120: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw cert.sh: #2121: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2122: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA.ca.cert cert.sh: #2123: Import Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2124: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #2125: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice.cert cert.sh: #2126: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw cert.sh: #2127: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2128: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA.ca.cert cert.sh: #2129: Import Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2130: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #2131: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob.cert cert.sh: #2132: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dave -f ../tests.pw cert.sh: #2133: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2134: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA.ca.cert cert.sh: #2135: Import Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2136: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #2137: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave.cert cert.sh: #2138: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/eve -f ../tests.pw cert.sh: #2139: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2140: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA.ca.cert cert.sh: #2141: Import Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2142: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #2143: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve.cert cert.sh: #2144: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #2145: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #2146: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #2147: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #2148: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #2149: Import Eve's cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw cert.sh: #2150: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2151: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #2152: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... cert.sh: #2153: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw cert.sh: #2154: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2155: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #2156: Import Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2157: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #2158: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert cert.sh: #2159: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:2e Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:40:35 2012 Not After : Tue Jun 26 21:40:35 2012 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:6f:5b:d8:4d:05:3d:d6:63:4d:85:8c:36:7a:b2:ee: 62:b7:a7:40:04:7e:c7:07:46:12:d9:8f:71:97:52:46: 7c:31:59:87:f5:d1:1a:0e:8e:85:24:63:fa:fc:6b:db: f0:3a:d2:5a:8e:dc:c9:87:50:55:b2:c1:e6:86:27:b4: 2e:b0:2c:da:7b:2b:f4:0e:95:29:e5:8f:72:07:86:d7: 6d:1b:40:e2:70:38:0d:33:e0:1c:4e:a2:d0:1a:c5:24: 36:b6:36:89:b6:90:83:99:37:8b:07:0b:2a:77:60:0b: a4:c9:f5:19:fa:c3:5d:74:32:4b:9c:78:c3:e0:93:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c2:25:b1:1b:65:eb:d2:3d:95:b3:f8:18:0b:e5:db:4a: 46:41:d8:56:a6:32:9e:c7:39:db:60:5b:0a:48:4b:61: 26:c2:a6:a3:3c:50:d2:97:74:04:cb:61:4b:21:9f:91: 6e:48:03:2f:9c:a1:77:8b:ae:e4:42:a5:d9:9a:5e:d2: 1b:95:10:1d:d2:3c:74:23:a2:2b:81:a7:72:7e:66:55: 50:4d:80:bb:ff:29:87:09:5c:3b:0b:bf:fd:50:99:d5: 2b:7e:a8:a2:a9:58:66:0d:b2:c5:20:cf:ba:31:9c:8a: f5:48:93:c3:ef:b0:8b:fd:6e:64:24:2b:53:69:91:80 Fingerprint (MD5): D4:BC:3B:06:5E:7D:94:47:86:B9:E6:86:92:4C:BD:22 Fingerprint (SHA1): FB:E7:4A:44:88:AE:FA:B9:97:C0:B0:B1:B2:38:34:6C:55:97:CB:5A Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2160: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:2f Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:40:36 2012 Not After : Tue Jun 26 21:40:36 2012 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:da:99:72:c4:a3:98:da:54:3c:40:3a:76:02:e5:6b: c8:d3:16:5b:d6:fa:9f:b4:fa:19:48:64:6e:ff:3c:8b: 6d:63:6c:1f:85:01:c5:eb:8b:97:98:f7:fd:5a:7d:20: 66:9f:92:dc:3b:3e:6f:5f:49:c1:4c:74:75:94:46:4a: 9d:73:cc:f7:04:89:17:c2:b6:8d:57:1f:6a:f7:c5:73: 2d:90:4c:64:80:8a:c4:82:04:8f:93:7b:83:03:40:d3: f0:39:ef:f9:f3:b3:36:f6:a3:03:85:d9:05:e2:41:0f: 2c:7f:8a:26:08:cd:b9:8f:9b:ab:97:c9:60:5e:8a:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f6:c6:44:1a:91:5a:00:9f:f3:31:3b:01:fc:75:ea: 51:fb:9a:e7:7b:af:bb:98:15:b0:22:bc:74:7c:7b:9c: b4:6f:59:05:e9:e0:df:0b:f5:6f:66:a2:82:72:d2:3f: 40:07:e4:6a:e9:97:48:39:d0:d8:55:c1:0b:17:98:66: a4:fc:05:32:12:2a:30:42:65:55:59:c2:7a:03:c6:19: cd:72:4b:c3:0e:ed:62:17:f2:46:4a:8d:91:d3:42:7e: 4d:99:da:b9:3d:bb:67:63:fc:9e:9e:da:f7:eb:51:d5: ef:87:fa:8a:8a:6a:4b:e4:76:93:eb:f2:4c:34:77:1b Fingerprint (MD5): 1F:38:D6:37:BE:45:54:85:15:17:52:41:89:32:85:B9 Fingerprint (SHA1): 84:B2:D6:4F:33:F8:F9:A1:D8:A0:11:3F:18:CA:E1:78:0D:1F:E5:64 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2161: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:30 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:40:36 2012 Not After : Tue Jun 26 21:40:36 2012 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:77:06:f4:61:74:2e:3e:1f:af:91:2d:f4:d4:d6:79: da:3f:63:09:80:a0:6b:f6:ed:f6:62:a3:68:90:5e:f8: e4:dc:c4:26:b4:45:ed:39:02:af:51:f1:44:00:0c:fd: 5d:8f:6f:5f:6f:aa:de:69:91:d3:9c:7a:7a:32:64:e6: e3:80:fa:d3:9f:9a:38:25:17:8d:fa:a9:7f:c1:1d:f0: cd:f0:b2:8b:45:94:15:9c:ca:ec:38:63:ad:62:78:dd: 98:37:61:5e:b1:d4:15:ec:3b:c8:6f:1b:57:ab:70:6a: f9:5f:7e:c0:16:68:6a:6f:cc:ad:db:c6:4f:f0:e6:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:e1:da:1f:86:7b:df:3d:b9:6a:5b:9d:4a:e0:bf:01: 87:e7:40:7a:8b:5f:4d:bd:93:1c:d5:7b:99:01:7b:25: 02:fc:8e:81:04:c3:51:e8:ef:32:25:ec:ea:29:e8:e3: 15:76:e2:b1:6d:9f:fa:14:3e:1b:2c:34:f9:fa:c7:07: 96:94:bc:08:81:7e:39:8d:04:a4:b8:fd:e5:93:c9:1a: 41:3d:0c:fb:ab:fe:11:0c:4f:56:ac:b1:57:b2:69:be: b2:60:7e:48:55:72:06:bc:26:50:3f:04:21:fd:12:e5: 5e:a7:e7:dc:cc:0b:f9:25:1d:48:4d:d1:92:94:07:ba Fingerprint (MD5): EE:BC:7D:33:BE:7D:21:8E:95:57:EC:31:A5:E8:38:A2 Fingerprint (SHA1): 76:11:8F:EB:A9:E6:55:99:FB:64:16:5D:51:09:6E:11:CE:5E:C2:C7 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2162: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:31 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:40:37 2012 Not After : Tue Jun 26 21:40:37 2012 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:e6:8c:e2:51:0a:4f:78:e8:74:70:47:80:06:de:1e: 93:eb:24:8b:7a:d2:20:f9:dd:b0:71:d7:ad:28:2b:e9: ee:4a:eb:7e:f9:ea:92:9b:75:0e:cc:17:0d:61:7c:bf: 06:8f:53:bc:16:ed:e6:b8:f4:1c:bc:01:0a:c6:21:5c: dd:83:c8:f0:ac:8c:28:a4:b4:9c:93:d3:c4:34:1e:05: 3a:18:80:6b:b5:69:6e:73:dd:94:06:82:70:61:ef:4c: ff:62:2f:3d:61:28:f6:a8:e3:22:7d:1b:5d:12:24:c0: 98:f3:e2:c3:cc:7f:26:fa:bc:41:f4:77:a8:a6:73:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6a:1c:c9:6d:bf:96:8f:6c:99:cd:d5:2e:fd:0e:43:f7: fb:dc:01:6f:24:e4:00:59:a3:b7:33:fb:38:73:7d:e6: 1a:c4:c4:bb:58:77:d7:0a:8d:0d:6b:58:e1:a4:72:8c: 2d:26:54:6d:3c:6d:d1:06:fe:6c:3d:11:92:db:62:7b: 09:38:fc:0f:7b:c3:32:e6:2b:81:ba:8a:5e:30:bd:5c: 97:7c:8d:3f:dc:0c:22:3b:3a:c5:d2:df:9f:7a:21:a2: 0e:e7:65:68:79:61:af:92:b5:d7:b1:d3:7e:b0:00:63: 1d:3c:9d:2f:e4:95:e7:61:79:e2:0d:04:3e:8c:dc:4b Fingerprint (MD5): 99:FA:41:FD:13:26:30:B3:68:18:B3:B1:3C:0D:44:B0 Fingerprint (SHA1): 96:C5:E7:09:D1:DB:B9:46:8E:E2:42:C6:C1:29:41:6A:05:B1:4A:6D Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2163: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:32 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:40:37 2012 Not After : Tue Jun 26 21:40:37 2012 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:27:35:fa:a6:92:5a:e5:e6:24:f3:0d:de:08:81:29: 29:61:71:2b:d2:7d:eb:03:0f:0b:24:81:76:89:c9:44: f3:7c:b5:99:37:c9:5e:f0:46:4c:74:5f:e4:94:96:e4: 75:8d:12:91:b6:42:b1:3d:2c:15:7e:1a:5b:c0:7c:74: 01:09:b4:e2:bd:99:c7:6b:e6:a7:58:20:51:3d:de:d9: fe:a0:ab:bd:d1:c9:b4:83:c1:33:0a:d9:41:2e:d4:49: 44:fc:d5:d4:81:b7:5f:7d:6f:d6:ac:5c:bf:ad:01:3c: af:b7:8b:4c:c4:d7:66:06:9b:bb:c7:76:5c:09:8b:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 25:94:6c:0c:f8:00:75:f2:5e:2f:6a:35:05:02:dc:5a: 99:5b:d4:03:1e:e9:21:31:bd:a4:59:3b:cc:5a:23:b3: cb:31:0e:19:1c:dc:90:e8:9d:68:2a:0e:c1:0e:21:99: 04:e3:69:cc:5c:d0:b5:e1:a8:d1:43:40:21:bb:75:de: 96:1f:52:30:e6:7e:a4:1f:c7:8a:bd:1d:ed:0a:8d:7c: 6b:ad:3b:6c:56:45:48:dd:94:2b:e0:3a:88:53:23:bb: d7:80:fa:f2:62:73:55:f9:9a:6e:5e:fd:7d:58:04:bd: 20:06:2f:8b:0a:a5:9d:1a:c1:09:8f:0b:01:e9:72:1b Fingerprint (MD5): 1A:AF:99:04:44:65:F5:22:1D:86:8D:E5:A9:4C:A9:1C Fingerprint (SHA1): D1:C8:CC:08:99:2C:32:24:7E:2B:CF:F3:AD:D5:75:A8:F3:BF:3F:E6 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2164: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:32 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:40:37 2012 Not After : Tue Jun 26 21:40:37 2012 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:9f:55:b9:0f:d1:84:57:48:0d:99:43:09:fe:a8:cd: 63:9b:c2:28:b0:26:17:1b:8b:ee:94:fc:1c:f4:af:0d: 3f:01:17:05:6c:c1:a4:af:32:82:b8:58:24:75:68:ad: 6e:28:98:82:88:8e:b0:54:e1:d0:b5:df:d8:d2:5e:43: 6f:ed:ec:96:8c:13:1a:31:a9:74:dd:f1:42:81:58:29: d1:6d:67:e7:f6:d5:4a:3e:9c:91:a1:5d:71:57:75:0b: 73:3f:55:02:48:d6:f5:8b:24:76:0d:3d:20:2e:ed:45: 0b:7c:6c:3f:8a:bc:c1:9c:59:b5:24:e5:57:30:e4:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 23:31:fc:fd:68:2e:2f:55:25:45:05:27:12:8f:ab:41: ef:97:b2:fb:4a:6d:fa:2c:21:39:17:45:5c:66:4d:12: 09:8d:9a:c7:01:33:9e:16:b0:ee:59:d4:81:1a:5f:b7: 36:d2:52:de:a1:cf:63:df:31:6f:6c:5c:d2:23:42:97: 37:63:e8:85:b9:47:ac:8c:09:8e:27:80:ce:89:5b:2c: b8:a4:fa:6a:42:5e:c2:43:d9:c2:d1:47:ee:dd:db:9b: 58:20:12:ad:2c:7e:0d:3a:f6:b6:db:97:3f:b4:31:6a: d7:b5:90:39:ca:e4:14:8a:3e:f0:f3:7b:f2:96:b1:d2 Fingerprint (MD5): 40:67:2D:2E:FD:27:F8:0D:28:71:1A:D8:88:88:31:03 Fingerprint (SHA1): 09:43:AC:93:28:1E:AA:EE:57:CF:3A:CE:F5:10:BD:A9:5B:1E:62:91 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2165: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:33 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:40:38 2012 Not After : Tue Jun 26 21:40:38 2012 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:32:3c:a8:c3:79:c5:e5:bc:e4:5c:06:67:13:e5:c1: c5:f4:14:27:c1:ea:87:93:b0:72:32:2d:92:ba:7d:ef: 38:e3:a4:47:cb:4f:f7:16:d5:18:b0:d4:f7:61:52:2d: 28:be:04:7f:25:6d:79:29:1b:20:de:6a:98:94:13:76: 72:c6:93:e7:aa:04:58:55:45:93:15:b7:f4:19:39:80: cd:a5:ac:bd:51:79:69:1c:79:81:57:6e:90:de:f3:f7: 4a:12:b1:41:85:c0:f6:5a:82:f5:3a:69:a3:3d:ac:9c: 0f:f7:14:d0:39:05:d1:04:93:de:8e:a2:a6:0d:f4:41 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1b:83:92:90:20:fb:58:30:1a:d2:dc:56:4e:b0:32:99: c4:25:7c:2e:50:04:db:1a:03:9a:3a:2d:76:99:50:63: 80:b5:01:98:d0:69:1f:2e:e5:78:8a:3e:fc:db:11:6c: 7d:05:5d:3b:e3:b6:53:eb:9d:ac:b5:72:10:9c:18:25: 8e:f3:b9:8f:fa:a9:21:da:ef:25:da:38:61:4f:a2:17: 9a:a7:a9:c8:4c:5e:c7:bb:6b:01:8e:2e:b2:bf:26:7d: e4:a2:79:e5:f9:09:7b:77:0c:1c:37:1c:de:34:4c:85: c7:b2:4b:7b:c4:e1:51:f8:66:a6:2d:dc:37:ea:ca:13 Fingerprint (MD5): 7F:3A:D5:4B:2E:31:82:12:2F:41:DD:B2:6A:5B:E6:EE Fingerprint (SHA1): 9B:7C:6B:3B:94:53:C2:F5:AE:98:01:C9:56:46:E3:0E:E6:06:B4:11 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2166: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:34 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:40:38 2012 Not After : Tue Jun 26 21:40:38 2012 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:c1:ae:03:b8:c0:f5:b1:9b:64:c5:ef:f3:dd:74:87: 91:e5:cc:68:d7:75:2d:43:7d:ff:36:34:75:e4:71:04: 47:9b:b2:35:3d:98:50:22:2f:59:46:02:65:f2:20:ed: ed:41:5a:34:54:57:7c:31:bc:8e:1f:37:19:35:dd:5a: 56:ca:38:96:43:9c:77:f6:44:26:73:6d:81:0f:97:04: 22:c6:56:0e:6b:7d:8f:83:ba:a9:2f:65:b9:f5:8f:a0: 75:72:66:33:67:56:a8:32:45:8d:4f:71:ec:d1:3a:21: c3:00:ec:ec:76:21:4b:6c:d3:fc:07:fb:2e:0c:be:fd Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2b:f4:80:f1:ec:2b:66:2e:cb:f6:ba:2c:0e:25:48:ed: c9:7e:cd:df:19:aa:30:85:8f:e9:72:a6:33:07:c3:c5: 4d:52:af:c3:e9:ee:6b:0a:42:47:f1:46:1a:ca:1e:5a: a8:60:00:f4:45:26:e3:d6:7e:72:34:ad:da:a3:a4:b1: 9e:76:7f:91:20:f5:cd:18:e2:be:e1:9b:51:e2:d9:6a: a9:3a:29:0e:53:21:92:aa:6e:a1:77:02:95:54:c7:e6: 61:0b:79:66:75:77:a0:27:26:f3:62:55:63:2b:20:34: c0:34:60:68:03:e8:75:b3:da:74:6f:3f:24:59:cb:cc Fingerprint (MD5): 6C:0A:E7:F7:83:B8:0E:B8:30:B4:FC:8D:38:5C:3D:3F Fingerprint (SHA1): 4F:47:FC:16:D7:BE:EB:3F:81:D1:C8:2B:74:2B:69:08:AE:4B:22:C5 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2167: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:34 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:40:38 2012 Not After : Tue Jun 26 21:40:38 2012 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:8f:38:42:3a:5e:06:ae:58:ad:04:51:8f:7d:6f:8e: cc:6e:be:b5:55:f8:76:98:9d:a9:40:c8:de:1b:30:04: e8:16:53:d5:24:a3:60:35:33:ba:82:4b:68:a4:c4:09: 1e:39:af:a1:10:5b:c7:ac:c7:87:6e:82:68:dd:23:17: 78:7b:f9:d7:0f:84:1d:e5:2b:66:f5:da:2c:2d:e2:68: 70:96:10:53:e7:26:ef:04:04:d7:b6:73:cc:e2:86:4a: 4d:44:ad:1f:77:09:3b:d7:a5:00:50:fe:0b:7f:a6:da: 38:60:6f:94:3b:fb:c4:b4:97:b3:b4:f7:ee:62:f2:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7d:07:f2:96:6b:37:bc:14:bf:36:16:be:87:a1:34:fa: c4:65:4b:c2:b6:97:dc:b3:1b:5e:61:0c:46:aa:ee:1c: ff:68:ac:c9:55:d2:2e:0c:f7:33:a4:30:32:1a:17:b1: fd:39:df:b1:93:87:bd:69:87:04:c5:7f:ea:7c:87:93: df:49:37:01:d8:81:1b:59:db:52:9c:95:a2:d5:35:9d: 12:c3:39:4f:ec:1b:bc:fe:dc:00:d2:99:c3:50:4e:e2: 97:22:cb:cb:57:ac:9d:4a:17:50:5c:18:ad:00:4e:a5: 92:33:8a:e4:1a:18:42:7e:c3:3d:d4:06:ed:f3:25:4e Fingerprint (MD5): D4:A2:96:23:8A:CA:14:C4:3D:1B:45:51:83:4D:16:32 Fingerprint (SHA1): BB:30:D8:5C:0D:CA:67:0A:C2:83:0D:44:88:54:09:EA:14:2A:33:AC Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2168: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:35 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:40:39 2012 Not After : Tue Jun 26 21:40:39 2012 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:59:12:b5:a1:cc:26:0c:85:c0:19:76:1d:37:2f:5f: 3e:0e:05:0e:2a:f7:df:e1:f0:32:12:a2:03:6b:12:29: fc:1a:b2:0c:1e:25:5d:02:94:e9:29:87:62:ca:55:a1: 4e:5d:a5:bc:45:9f:eb:ed:67:e2:10:fa:5e:49:5f:23: a5:80:4a:71:b2:6a:de:27:9e:19:c9:95:18:43:aa:2c: 11:b4:71:1c:59:4c:64:96:84:f5:e4:34:c1:61:db:02: bd:e5:7e:16:9e:39:60:5e:82:c4:36:0a:ac:df:2a:9e: 10:e8:26:aa:1a:98:df:65:e6:7f:ef:9e:fe:eb:81:db Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 36:08:ca:2c:b8:c6:fe:8d:58:05:80:ae:64:a1:04:5e: aa:3f:55:94:8e:33:7e:1b:01:74:04:f8:e1:9b:f9:68: ec:d7:47:16:bf:1c:5c:40:05:d9:e2:43:d7:0e:c9:d4: 61:31:2f:e9:fa:0b:02:88:2a:19:1b:99:7f:83:71:0c: be:96:05:2b:01:01:60:b8:c0:e8:85:5f:17:ef:e1:7a: e6:51:b5:7b:ce:e8:92:6c:07:24:2a:3b:f1:ef:52:13: 06:3e:22:0b:9e:52:ea:80:56:4d:93:03:69:43:b1:1e: e2:af:1f:33:bb:1c:be:81:8a:03:8e:c0:c4:e3:14:16 Fingerprint (MD5): 18:D8:CE:5E:31:7F:5F:95:5C:BE:25:D5:24:81:AF:71 Fingerprint (SHA1): D6:0F:DF:9A:64:39:B2:6F:EE:27:BB:9E:9A:4D:C1:E5:71:A2:09:5B Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2169: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:87:36 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:40:40 2012 Not After : Tue Jun 26 21:40:40 2012 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:a8:ea:a2:52:6d:ab:a3:49:e1:96:3d:54:6d:0c:b6: ac:f7:be:3a:06:b1:77:9b:35:34:e5:6b:ea:1c:f1:72: f1:56:92:d6:e0:0c:a6:86:e6:f7:ce:1e:aa:08:cd:6f: d2:c9:54:8b:18:f7:ae:17:11:2b:12:ff:fa:4d:de:e9: 84:f9:83:b6:34:aa:b4:6a:6c:96:59:15:43:92:bc:59: 35:ff:6a:b8:58:60:11:77:7e:b2:96:b1:84:a8:50:9a: ff:9b:5c:50:f1:61:4e:c4:06:f3:0d:d0:81:46:44:e9: 94:df:6b:e7:59:05:5c:b7:d5:92:ab:40:47:91:dc:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1d:bc:9f:e9:a3:3f:44:db:52:9d:f6:76:9e:9a:31:a2: 20:fb:1c:4e:56:52:f0:36:69:20:e0:22:e8:dc:e7:45: 56:9a:a7:5c:f2:83:7f:e8:dd:c5:56:5a:49:6b:e3:f0: 3a:d9:ec:d5:53:3b:cf:65:90:6a:b9:6a:4b:5d:b9:82: 5a:61:74:17:d6:84:f3:e5:58:3a:0f:5e:37:fc:ae:85: be:9d:8b:ad:ab:26:fe:0e:a4:4e:e3:c4:f6:e7:24:70: 21:a4:57:4d:48:6e:37:b7:bc:8e:df:da:4f:08:8f:78: 62:51:e3:e6:db:5c:41:44:92:0a:e3:c2:66:b0:8a:c9 Fingerprint (MD5): FD:E2:2C:2C:66:B3:17:A2:9D:A0:4B:F4:B3:7F:1A:F3 Fingerprint (SHA1): 58:09:F4:40:BC:D6:A0:D1:72:27:EE:C7:0B:17:71:50:A2:5F:8B:40 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2170: Certificate Key Usage Extension (11) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw cert.sh: #2171: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2172: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2173: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -o root.cert cert.sh: #2174: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #2175: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... cert.sh: #2176: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #2177: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #2178: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2179: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA.ca.cert cert.sh: #2180: Import Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2181: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #2182: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted.cert cert.sh: #2183: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #2184: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2185: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #2186: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #2187: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2188: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: `./req' and `/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #2189: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert cert.sh: #2190: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2191: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2192: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2193: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2194: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #2195: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #2196: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2197: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2198: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2199: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2200: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #2201: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2202: Verify Distrusted Cert for Object Signer - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2203: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #2204: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40.cert cert.sh: #2205: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2206: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #2207: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41.cert cert.sh: #2208: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2209: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #2210: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42.cert cert.sh: #2211: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2212: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #2213: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43.cert cert.sh: #2214: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2215: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #2216: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44.cert cert.sh: #2217: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2218: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #2219: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45.cert cert.sh: #2220: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2221: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #2222: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46.cert cert.sh: #2223: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2224: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #2225: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47.cert cert.sh: #2226: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2227: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #2228: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48.cert cert.sh: #2229: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2230: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #2231: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49.cert cert.sh: #2232: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2233: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #2234: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50.cert cert.sh: #2235: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2236: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #2237: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51.cert cert.sh: #2238: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2239: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #2240: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52.cert cert.sh: #2241: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #2242: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #2243: Modify CRL by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #2244: Modify CRL by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #2245: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #2246: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: No matching CRL was found. cert.sh: #2247: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #2248: Importing CRL for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Mon Mar 26 17:40:55 EDT 2012 Running tests for tools TIMESTAMP tools BEGIN: Mon Mar 26 17:40:55 EDT 2012 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2249: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 69:f9:1b:9e:a7:5c:ae:68:6d:77:f1:fb:a9:e5:4a:06 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2250: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2251: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2252: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 07:34:a2:85:02:3b:25:6d:dd:0c:a4:9d:53:1e:20:95 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2253: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2254: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2255: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 40:c5:8e:ec:14:92:f6:66:97:14:a1:d9:ee:40:27:93 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2256: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2257: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2258: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 7a:77:74:e4:a0:1e:04:db:34:32:12:31:11:43:d9:84 Iteration Count: 1 (0x1) tools.sh: #2259: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2260: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2261: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cb:48:e9:40:5d:ef:c8:80:6f:80:71:5b:8f:77:71:e6 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2262: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2263: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2264: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a2:ad:a9:d5:b0:34:23:bc:12:97:aa:f7:0a:a5:6a:38 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2265: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2266: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2267: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 01:25:68:07:f6:a0:66:70:bd:98:aa:ba:65:63:33:8e Iteration Count: 1 (0x1) tools.sh: #2268: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2269: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2270: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: dd:35:3a:1b:36:88:7f:93:56:84:bf:ae:f8:3b:6a:02 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:19:a1:ed:4b:dc:24:99:bb:b0:a7:76:0e:0b:bd: a2:2d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2271: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2272: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2273: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a5:e2:03:61:30:8e:f0:41:7a:df:e7:7a:9a:9c:8b:18 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:93:9d:2b:33:dc:64:b7:82:d8:51:c6:a8:ed:02: 8b:ab Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2274: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2275: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2276: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a8:f5:21:ca:6d:87:66:cd:2b:78:55:d8:53:5f:11:cb Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:90:d1:73:af:ae:53:b3:24:2a:5e:51:5e:bf:bf: f0:e4 tools.sh: #2277: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2278: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2279: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 19:30:eb:d5:88:00:88:00:c4:1e:ea:29:ee:e4:c2:a4 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:d4:67:5c:fb:4d:a5:c8:e5:66:58:b4:4d:4d:22: 22:c2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2280: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2281: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2282: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e2:5a:25:b1:a5:45:a7:3b:06:76:b0:f1:87:e2:b8:36 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:da:83:e7:ac:65:4d:06:4f:2e:ee:be:8f:13:7b: 00:97 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2283: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2284: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2285: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ca:5f:9b:85:e2:70:87:30:03:1c:a6:bd:7f:0f:c7:e3 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:b6:ca:b6:8b:f3:42:ce:34:23:30:c4:2e:6d:c4: dd:27 tools.sh: #2286: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2287: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2288: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: be:5b:5e:2c:5d:05:70:4e:34:09:a0:89:7a:45:10:80 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d5:c3:74:27:c6:e4:27:f0:78:af:43:8c:6f:18: 51:56 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2289: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2290: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2291: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c1:82:df:9a:4c:90:08:8b:66:f8:39:a7:d4:29:9a:01 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:5b:b1:97:9e:f7:f7:ae:aa:c9:18:2b:f1:14:70: dd:90 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2292: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2293: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2294: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 95:72:68:e1:bc:e9:8a:16:cc:25:0a:55:79:50:02:03 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:88:92:f4:38:4b:41:b4:f6:4c:ee:3e:ea:81:43: e0:a9 tools.sh: #2295: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2296: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2297: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ee:6d:d2:7f:02:bc:40:e0:cd:fa:0a:4b:53:67:09:66 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:4f:63:36:c5:45:4e:3c:01:52:d4:d0:15:00:91: 47:9e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2298: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2299: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2300: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 87:d6:cb:b2:32:c8:c5:07:7b:0d:8c:80:db:e9:66:70 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:69:55:35:bf:68:d2:19:55:44:3d:2e:0b:2d:8f: 0f:ba Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2301: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2302: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2303: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5a:fb:cc:c7:2f:57:71:c4:82:e8:44:65:65:80:18:46 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:61:76:69:48:c3:79:ba:ae:91:a2:7b:dc:b5:10: db:02 tools.sh: #2304: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2305: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2306: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a4:5d:3a:2b:cd:28:05:38:47:31:45:90:c2:d1:d0:5b Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:e3:c7:77:81:77:6e:90:16:96:5a:15:4c:a1:5d: 12:0f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2307: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2308: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2309: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d8:93:de:a8:ea:aa:c0:da:b3:1c:e8:7c:08:6a:14:8d Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:95:c6:07:fe:1b:62:b9:73:35:dd:37:82:26:63: 04:9d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2310: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2311: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2312: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 74:b0:72:35:03:6d:a9:e0:5e:22:f5:40:08:32:c3:81 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:c3:a5:29:99:20:d6:d0:e4:a8:01:f3:7a:28:46: e3:38 tools.sh: #2313: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2314: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2315: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 93:80:e4:fa:db:3f:1c:0a:58:78:09:be:16:a3:2b:e4 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:b9:dc:e0:6e:84:9d:4e:58:4a:c9:86:79:7e:76: cf:b9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2316: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2317: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2318: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0f:d2:36:96:ea:eb:e6:e0:a7:c2:00:69:b3:27:b6:12 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:a9:5b:06:0e:85:6e:2c:18:2b:98:a4:46:a8:b7: 8b:73 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2319: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2320: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2321: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 43:2b:59:62:55:ae:9e:03:e6:50:42:20:70:f9:fb:4c Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:96:a6:f6:2d:f4:37:0a:8b:8c:fb:c6:f7:42:88: 56:94 tools.sh: #2322: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2323: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2324: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: d9:54:c6:23:5f:79:46:e7:df:f4:4c:b4:5c:96:1c:8e Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2325: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2326: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2327: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: d9:1b:44:cc:62:0d:c3:1e:10:aa:ee:66:79:98:21:f8 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2328: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2329: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2330: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 2c:99:a9:d3:54:dc:ff:1a:2b:8a:dd:a4:f1:ae:ed:9e Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2331: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2332: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2333: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 81:9c:96:1a:e0:72:98:5b:c3:c2:ab:2d:0c:6f:a9:75 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2334: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2335: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2336: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 03:58:da:de:f4:6d:3d:15:ca:82:fa:2c:64:87:2c:04 Iteration Count: 1 (0x1) tools.sh: #2337: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2338: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2339: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 05:b1:ea:72:9f:25:90:97:af:0a:f3:d9:57:95:28:42 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2340: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2341: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2342: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 1c:ab:b6:a5:af:1c:45:bf:8d:f6:dc:ab:d1:37:16:53 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2343: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2344: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2345: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 53:b5:61:52:6b:c4:0f:9e:0b:56:b0:9b:7e:86:91:84 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2346: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2347: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2348: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 20:d7:8c:b4:42:ed:09:f5:d6:7e:3a:b8:65:bd:da:17 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2349: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2350: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2351: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 3a:4d:6c:1e:88:12:37:38:38:09:55:7a:88:b0:08:42 Iteration Count: 1 (0x1) tools.sh: #2352: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2353: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2354: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3e:0c:c0:ca:af:0b:86:7b:b3:26:66:61:73:a3:b6:6b Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2355: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2356: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 92:09:f4:e2:cb:ac:49:4f:14:de:56:29:8c:2f:e9:d8 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2358: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2359: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2360: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: fb:7c:2d:b3:83:66:d1:df:96:aa:14:69:18:67:d8:48 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2361: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2362: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2363: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 98:4c:be:8b:ee:07:ed:03:8a:71:3f:57:c2:03:a9:66 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2364: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2365: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2366: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ea:53:78:b5:d9:ed:47:a4:dc:ac:17:6f:c7:b2:86:19 Iteration Count: 1 (0x1) tools.sh: #2367: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2368: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2369: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: df:8f:a9:50:e6:38:51:2f:64:98:97:70:8e:a0:4e:4f Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2370: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2371: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2372: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f1:a0:da:c8:fb:0e:eb:57:42:1a:41:f8:07:3f:61:d6 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2373: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2374: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2375: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 07:be:71:c5:ef:5b:7c:d0:bc:80:cb:18:c5:21:6b:fe Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2376: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2377: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2378: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 08:cc:32:b1:66:8d:91:e9:e8:c7:62:45:31:41:e4:91 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2379: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2380: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2381: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 72:98:4b:e6:72:50:11:b0:f6:12:a3:eb:5a:d8:0d:12 Iteration Count: 1 (0x1) tools.sh: #2382: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2383: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2384: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fd:86:1a:1e:36:49:25:45:4a:ea:e2:43:13:5e:ed:9a Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2385: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2386: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2387: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f5:3d:c7:9c:2b:84:43:0a:7c:cb:d7:1e:54:09:3e:20 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2388: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2389: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2390: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 38:fc:6e:49:bb:1a:f2:8a:b4:66:01:48:33:00:f7:ff Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2391: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2392: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2393: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3d:f9:80:9c:5d:70:e3:e0:d0:67:79:05:75:f7:f1:bd Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2394: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2395: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2396: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: df:71:88:43:74:05:01:ea:c2:e7:02:47:5b:70:2b:59 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2397: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2398: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2399: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 01:fa:23:d9:86:53:83:8d:76:0e:f6:5d:f4:93:e4:d5 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2400: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2401: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2402: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 16:64:e7:68:95:83:74:72:a9:7b:eb:87:2e:dd:6a:d7 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2403: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2404: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2405: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e3:c8:d3:bc:74:c6:e5:05:b2:f1:99:ff:a7:43:0c:7b Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2406: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2407: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2408: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 91:9c:f4:0f:77:d7:d2:ce:ed:7f:0e:fc:c4:80:01:c7 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2409: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2410: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2411: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5e:86:e4:b2:f8:8c:aa:3e:27:54:32:ee:c1:80:56:dc Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:28 2012 Not After : Sun Mar 26 21:40:28 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e8:00:38:b3:be:c8:18:1e:f1:2d:4d:6e:ae:81:92: d5:3e:28:12:ca:8f:62:a7:d3:e8:5c:94:43:1b:34:ab: 37:cd:67:fa:bd:01:e7:db:ac:5b:93:7d:d8:23:97:3a: 33:57:99:8e:77:e9:e5:17:08:61:e6:75:12:85:76:68: 08:f1:b6:e9:5f:49:d2:b7:ca:34:bb:f9:c9:48:a2:be: 66:29:a7:8d:6d:ae:db:1d:1d:f3:4d:d2:86:f3:e4:49: dd:39:99:25:54:3f:04:43:7e:68:5a:ca:01:ec:7c:f9: a4:7f:fb:ea:b4:f3:7b:4b:c0:28:85:59:03:35:c0:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ce:51:90:85:67:f0:da:ea:1e:2a:c7:12:00:f0:5c:13: d7:43:e3:37:85:ab:6e:74:83:1e:92:b3:ad:eb:ce:fc: c4:2d:71:9e:6e:53:55:2f:46:5a:16:c1:a4:55:bb:3d: 42:8f:15:c2:fc:c6:ed:c0:82:dc:26:ec:2c:ba:cc:1b: a1:4a:59:d0:06:d8:e6:65:98:71:70:fd:39:cf:10:0f: 38:ce:41:f8:4c:31:b4:70:7d:f3:79:a7:57:33:04:f9: 7b:03:6f:e2:2e:09:f4:56:16:c9:c0:ac:6f:b8:9b:f6: 27:1f:34:24:91:ae:cd:f2:a3:33:33:63:fe:43:a7:e4 Fingerprint (MD5): E3:67:94:F2:AF:5A:A7:49:08:E7:0E:7A:E9:F3:AB:2C Fingerprint (SHA1): F7:F7:B4:78:D6:9E:B7:0A:CD:D1:43:54:1B:BB:DD:6C:65:FF:E3:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:40:33 2012 Not After : Sun Mar 26 21:40:33 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:1b:18:f6:61:30:9d:b3:7a:91:5c:10:08:39:c6:f9: fa:0e:a2:b0:ef:c2:62:f0:42:1a:77:19:3f:5e:cf:4e: 8e:d5:51:c6:b2:d6:5b:88:58:4f:67:b5:ab:79:8a:85: 2b:6a:d6:52:5a:6c:4a:77:95:55:f7:60:36:b7:e7:52: b7:3a:93:b4:93:66:af:17:c2:cc:13:b1:30:4f:5b:7c: c9:ec:5b:6f:1f:41:46:19:73:35:a3:f8:a4:da:ba:f7: d4:58:42:f5:c1:55:81:ff:37:f8:0f:4f:e5:19:37:73: 45:fc:ca:b8:c7:8c:97:3f:23:b5:ab:47:b3:71:98:cf Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:e6:c0:32:08:14:80:73:9f:9f:cc:98:6f:b9:02:df: 60:df:2d:f4:ec:4c:f5:25:d8:63:1d:b4:3e:06:bf:b2: f3:0c:00:b2:cf:0b:97:eb:8d:ba:5d:4b:9c:e6:4e:60: d5:6b:4b:15:ca:07:18:fc:d8:36:fd:35:0a:e4:da:8d: 30:02:13:1c:f0:c9:5d:9c:c7:d7:f7:a1:6d:26:32:3a: d3:66:ec:0f:44:d2:90:eb:68:19:eb:61:6e:7a:06:e3: 5a:1b:9c:93:ce:a6:9e:4e:47:58:fe:ca:10:ca:bd:85: 0d:cc:08:1d:01:1c:7c:d2:0f:0b:5d:0c:2f:79:fb:05 Fingerprint (MD5): A3:75:0B:46:3F:DC:CD:90:9A:BE:F7:CB:DA:91:7A:18 Fingerprint (SHA1): 66:B1:7D:D3:51:65:AB:C6:A2:95:DE:80:8C:5A:15:52:FB:6B:66:A2 Friendly Name: Alice tools.sh: #2412: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2413: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": security library: invalid algorithm. tools.sh: #2414: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2415: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #2416: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 55%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 54%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #2417: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #2418: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #2419: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 55%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 54%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #2420: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #2421: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #2422: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Mon Mar 26 17:41:00 EDT 2012 Running tests for fips TIMESTAMP fips BEGIN: Mon Mar 26 17:41:00 EDT 2012 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #2423: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2424: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 3b1b8958e6e50e93c9ac540ee56c834abf9754ff NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #2425: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect. fips.sh: #2426: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #2427: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #2428: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #2429: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2430: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #2431: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #2432: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #2433: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #2434: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #2435: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 3b1b8958e6e50e93c9ac540ee56c834abf9754ff FIPS_PUB_140_Test_Certificate fips.sh: #2436: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #2437: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #2438: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #2439: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #2440: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 3b1b8958e6e50e93c9ac540ee56c834abf9754ff FIPS_PUB_140_Test_Certificate fips.sh: #2441: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #2442: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #2443: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x000bcf4d (773965): from 49 (73) to 69 (105) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/fips/mangle dbtest -r -d ../fips fips.sh: #2444: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Mon Mar 26 17:41:23 EDT 2012 Running tests for ssl TIMESTAMP ssl BEGIN: Mon Mar 26 17:41:23 EDT 2012 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16105 >/dev/null 2>/dev/null selfserv_9280 with PID 16105 found at Mon Mar 26 17:41:23 EDT 2012 selfserv_9280 with PID 16105 started at Mon Mar 26 17:41:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2445: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 16105 at Mon Mar 26 17:41:23 EDT 2012 kill -USR1 16105 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16105 killed at Mon Mar 26 17:41:23 EDT 2012 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16161 >/dev/null 2>/dev/null selfserv_9280 with PID 16161 found at Mon Mar 26 17:41:23 EDT 2012 selfserv_9280 with PID 16161 started at Mon Mar 26 17:41:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2446: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 16161 at Mon Mar 26 17:41:23 EDT 2012 kill -USR1 16161 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16161 killed at Mon Mar 26 17:41:23 EDT 2012 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16217 >/dev/null 2>/dev/null selfserv_9280 with PID 16217 found at Mon Mar 26 17:41:23 EDT 2012 selfserv_9280 with PID 16217 started at Mon Mar 26 17:41:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2447: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 16217 at Mon Mar 26 17:41:24 EDT 2012 kill -USR1 16217 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16217 killed at Mon Mar 26 17:41:24 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16285 >/dev/null 2>/dev/null selfserv_9280 with PID 16285 found at Mon Mar 26 17:41:24 EDT 2012 selfserv_9280 with PID 16285 started at Mon Mar 26 17:41:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2448: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 16285 at Mon Mar 26 17:41:24 EDT 2012 kill -USR1 16285 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16285 killed at Mon Mar 26 17:41:24 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16341 >/dev/null 2>/dev/null selfserv_9280 with PID 16341 found at Mon Mar 26 17:41:24 EDT 2012 selfserv_9280 with PID 16341 started at Mon Mar 26 17:41:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2449: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 16341 at Mon Mar 26 17:41:24 EDT 2012 kill -USR1 16341 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16341 killed at Mon Mar 26 17:41:24 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16397 >/dev/null 2>/dev/null selfserv_9280 with PID 16397 found at Mon Mar 26 17:41:24 EDT 2012 selfserv_9280 with PID 16397 started at Mon Mar 26 17:41:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2450: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 16397 at Mon Mar 26 17:41:24 EDT 2012 kill -USR1 16397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16397 killed at Mon Mar 26 17:41:24 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16465 >/dev/null 2>/dev/null selfserv_9280 with PID 16465 found at Mon Mar 26 17:41:24 EDT 2012 selfserv_9280 with PID 16465 started at Mon Mar 26 17:41:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2451: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 16465 at Mon Mar 26 17:41:24 EDT 2012 kill -USR1 16465 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16465 killed at Mon Mar 26 17:41:24 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16521 >/dev/null 2>/dev/null selfserv_9280 with PID 16521 found at Mon Mar 26 17:41:24 EDT 2012 selfserv_9280 with PID 16521 started at Mon Mar 26 17:41:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2452: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 16521 at Mon Mar 26 17:41:25 EDT 2012 kill -USR1 16521 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16521 killed at Mon Mar 26 17:41:25 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:25 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16577 >/dev/null 2>/dev/null selfserv_9280 with PID 16577 found at Mon Mar 26 17:41:25 EDT 2012 selfserv_9280 with PID 16577 started at Mon Mar 26 17:41:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2453: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 16577 at Mon Mar 26 17:41:25 EDT 2012 kill -USR1 16577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16577 killed at Mon Mar 26 17:41:25 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:25 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16645 >/dev/null 2>/dev/null selfserv_9280 with PID 16645 found at Mon Mar 26 17:41:25 EDT 2012 selfserv_9280 with PID 16645 started at Mon Mar 26 17:41:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2454: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 16645 at Mon Mar 26 17:41:25 EDT 2012 kill -USR1 16645 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16645 killed at Mon Mar 26 17:41:25 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:25 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16701 >/dev/null 2>/dev/null selfserv_9280 with PID 16701 found at Mon Mar 26 17:41:25 EDT 2012 selfserv_9280 with PID 16701 started at Mon Mar 26 17:41:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2455: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 16701 at Mon Mar 26 17:41:25 EDT 2012 kill -USR1 16701 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16701 killed at Mon Mar 26 17:41:25 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:25 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16757 >/dev/null 2>/dev/null selfserv_9280 with PID 16757 found at Mon Mar 26 17:41:25 EDT 2012 selfserv_9280 with PID 16757 started at Mon Mar 26 17:41:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2456: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 16757 at Mon Mar 26 17:41:26 EDT 2012 kill -USR1 16757 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16757 killed at Mon Mar 26 17:41:26 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:26 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16827 >/dev/null 2>/dev/null selfserv_9280 with PID 16827 found at Mon Mar 26 17:41:26 EDT 2012 selfserv_9280 with PID 16827 started at Mon Mar 26 17:41:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2457: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 16827 at Mon Mar 26 17:41:26 EDT 2012 kill -USR1 16827 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16827 killed at Mon Mar 26 17:41:26 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:26 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16883 >/dev/null 2>/dev/null selfserv_9280 with PID 16883 found at Mon Mar 26 17:41:26 EDT 2012 selfserv_9280 with PID 16883 started at Mon Mar 26 17:41:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2458: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 16883 at Mon Mar 26 17:41:26 EDT 2012 kill -USR1 16883 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16883 killed at Mon Mar 26 17:41:26 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:26 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16939 >/dev/null 2>/dev/null selfserv_9280 with PID 16939 found at Mon Mar 26 17:41:26 EDT 2012 selfserv_9280 with PID 16939 started at Mon Mar 26 17:41:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2459: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 16939 at Mon Mar 26 17:41:26 EDT 2012 kill -USR1 16939 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16939 killed at Mon Mar 26 17:41:26 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:26 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17007 >/dev/null 2>/dev/null selfserv_9280 with PID 17007 found at Mon Mar 26 17:41:26 EDT 2012 selfserv_9280 with PID 17007 started at Mon Mar 26 17:41:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2460: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 17007 at Mon Mar 26 17:41:26 EDT 2012 kill -USR1 17007 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17007 killed at Mon Mar 26 17:41:26 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:26 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17063 >/dev/null 2>/dev/null selfserv_9280 with PID 17063 found at Mon Mar 26 17:41:26 EDT 2012 selfserv_9280 with PID 17063 started at Mon Mar 26 17:41:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2461: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 17063 at Mon Mar 26 17:41:27 EDT 2012 kill -USR1 17063 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17063 killed at Mon Mar 26 17:41:27 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17119 >/dev/null 2>/dev/null selfserv_9280 with PID 17119 found at Mon Mar 26 17:41:27 EDT 2012 selfserv_9280 with PID 17119 started at Mon Mar 26 17:41:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2462: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 17119 at Mon Mar 26 17:41:27 EDT 2012 kill -USR1 17119 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17119 killed at Mon Mar 26 17:41:27 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17187 >/dev/null 2>/dev/null selfserv_9280 with PID 17187 found at Mon Mar 26 17:41:27 EDT 2012 selfserv_9280 with PID 17187 started at Mon Mar 26 17:41:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2463: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 17187 at Mon Mar 26 17:41:27 EDT 2012 kill -USR1 17187 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17187 killed at Mon Mar 26 17:41:27 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17243 >/dev/null 2>/dev/null selfserv_9280 with PID 17243 found at Mon Mar 26 17:41:27 EDT 2012 selfserv_9280 with PID 17243 started at Mon Mar 26 17:41:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2464: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 17243 at Mon Mar 26 17:41:27 EDT 2012 kill -USR1 17243 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17243 killed at Mon Mar 26 17:41:27 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17299 >/dev/null 2>/dev/null selfserv_9280 with PID 17299 found at Mon Mar 26 17:41:27 EDT 2012 selfserv_9280 with PID 17299 started at Mon Mar 26 17:41:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2465: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 17299 at Mon Mar 26 17:41:27 EDT 2012 kill -USR1 17299 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17299 killed at Mon Mar 26 17:41:27 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17367 >/dev/null 2>/dev/null selfserv_9280 with PID 17367 found at Mon Mar 26 17:41:27 EDT 2012 selfserv_9280 with PID 17367 started at Mon Mar 26 17:41:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2466: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 17367 at Mon Mar 26 17:41:28 EDT 2012 kill -USR1 17367 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17367 killed at Mon Mar 26 17:41:28 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:28 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17423 >/dev/null 2>/dev/null selfserv_9280 with PID 17423 found at Mon Mar 26 17:41:28 EDT 2012 selfserv_9280 with PID 17423 started at Mon Mar 26 17:41:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2467: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 17423 at Mon Mar 26 17:41:28 EDT 2012 kill -USR1 17423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17423 killed at Mon Mar 26 17:41:28 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:28 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17479 >/dev/null 2>/dev/null selfserv_9280 with PID 17479 found at Mon Mar 26 17:41:28 EDT 2012 selfserv_9280 with PID 17479 started at Mon Mar 26 17:41:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2468: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 17479 at Mon Mar 26 17:41:28 EDT 2012 kill -USR1 17479 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17479 killed at Mon Mar 26 17:41:28 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:28 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17547 >/dev/null 2>/dev/null selfserv_9280 with PID 17547 found at Mon Mar 26 17:41:28 EDT 2012 selfserv_9280 with PID 17547 started at Mon Mar 26 17:41:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2469: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 17547 at Mon Mar 26 17:41:28 EDT 2012 kill -USR1 17547 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17547 killed at Mon Mar 26 17:41:28 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:28 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17603 >/dev/null 2>/dev/null selfserv_9280 with PID 17603 found at Mon Mar 26 17:41:28 EDT 2012 selfserv_9280 with PID 17603 started at Mon Mar 26 17:41:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2470: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 17603 at Mon Mar 26 17:41:28 EDT 2012 kill -USR1 17603 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17603 killed at Mon Mar 26 17:41:28 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:28 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17659 >/dev/null 2>/dev/null selfserv_9280 with PID 17659 found at Mon Mar 26 17:41:28 EDT 2012 selfserv_9280 with PID 17659 started at Mon Mar 26 17:41:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2471: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 17659 at Mon Mar 26 17:41:29 EDT 2012 kill -USR1 17659 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17659 killed at Mon Mar 26 17:41:29 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:29 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17727 >/dev/null 2>/dev/null selfserv_9280 with PID 17727 found at Mon Mar 26 17:41:29 EDT 2012 selfserv_9280 with PID 17727 started at Mon Mar 26 17:41:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2472: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 17727 at Mon Mar 26 17:41:29 EDT 2012 kill -USR1 17727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17727 killed at Mon Mar 26 17:41:29 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:29 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17783 >/dev/null 2>/dev/null selfserv_9280 with PID 17783 found at Mon Mar 26 17:41:29 EDT 2012 selfserv_9280 with PID 17783 started at Mon Mar 26 17:41:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2473: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 17783 at Mon Mar 26 17:41:29 EDT 2012 kill -USR1 17783 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17783 killed at Mon Mar 26 17:41:29 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:29 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17839 >/dev/null 2>/dev/null selfserv_9280 with PID 17839 found at Mon Mar 26 17:41:29 EDT 2012 selfserv_9280 with PID 17839 started at Mon Mar 26 17:41:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2474: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 17839 at Mon Mar 26 17:41:29 EDT 2012 kill -USR1 17839 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17839 killed at Mon Mar 26 17:41:29 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:29 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17907 >/dev/null 2>/dev/null selfserv_9280 with PID 17907 found at Mon Mar 26 17:41:29 EDT 2012 selfserv_9280 with PID 17907 started at Mon Mar 26 17:41:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2475: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 17907 at Mon Mar 26 17:41:29 EDT 2012 kill -USR1 17907 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17907 killed at Mon Mar 26 17:41:29 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:29 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17963 >/dev/null 2>/dev/null selfserv_9280 with PID 17963 found at Mon Mar 26 17:41:29 EDT 2012 selfserv_9280 with PID 17963 started at Mon Mar 26 17:41:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2476: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 17963 at Mon Mar 26 17:41:29 EDT 2012 kill -USR1 17963 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17963 killed at Mon Mar 26 17:41:29 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18019 >/dev/null 2>/dev/null selfserv_9280 with PID 18019 found at Mon Mar 26 17:41:30 EDT 2012 selfserv_9280 with PID 18019 started at Mon Mar 26 17:41:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2477: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 18019 at Mon Mar 26 17:41:30 EDT 2012 kill -USR1 18019 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18019 killed at Mon Mar 26 17:41:30 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18087 >/dev/null 2>/dev/null selfserv_9280 with PID 18087 found at Mon Mar 26 17:41:30 EDT 2012 selfserv_9280 with PID 18087 started at Mon Mar 26 17:41:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2478: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 18087 at Mon Mar 26 17:41:30 EDT 2012 kill -USR1 18087 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18087 killed at Mon Mar 26 17:41:30 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18143 >/dev/null 2>/dev/null selfserv_9280 with PID 18143 found at Mon Mar 26 17:41:30 EDT 2012 selfserv_9280 with PID 18143 started at Mon Mar 26 17:41:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2479: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 18143 at Mon Mar 26 17:41:30 EDT 2012 kill -USR1 18143 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18143 killed at Mon Mar 26 17:41:30 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18199 >/dev/null 2>/dev/null selfserv_9280 with PID 18199 found at Mon Mar 26 17:41:30 EDT 2012 selfserv_9280 with PID 18199 started at Mon Mar 26 17:41:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2480: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 18199 at Mon Mar 26 17:41:30 EDT 2012 kill -USR1 18199 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18199 killed at Mon Mar 26 17:41:30 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18267 >/dev/null 2>/dev/null selfserv_9280 with PID 18267 found at Mon Mar 26 17:41:30 EDT 2012 selfserv_9280 with PID 18267 started at Mon Mar 26 17:41:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2481: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 18267 at Mon Mar 26 17:41:31 EDT 2012 kill -USR1 18267 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18267 killed at Mon Mar 26 17:41:31 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:31 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18323 >/dev/null 2>/dev/null selfserv_9280 with PID 18323 found at Mon Mar 26 17:41:31 EDT 2012 selfserv_9280 with PID 18323 started at Mon Mar 26 17:41:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2482: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 18323 at Mon Mar 26 17:41:31 EDT 2012 kill -USR1 18323 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18323 killed at Mon Mar 26 17:41:31 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:31 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18379 >/dev/null 2>/dev/null selfserv_9280 with PID 18379 found at Mon Mar 26 17:41:31 EDT 2012 selfserv_9280 with PID 18379 started at Mon Mar 26 17:41:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2483: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 18379 at Mon Mar 26 17:41:31 EDT 2012 kill -USR1 18379 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18379 killed at Mon Mar 26 17:41:31 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:31 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18447 >/dev/null 2>/dev/null selfserv_9280 with PID 18447 found at Mon Mar 26 17:41:31 EDT 2012 selfserv_9280 with PID 18447 started at Mon Mar 26 17:41:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2484: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 18447 at Mon Mar 26 17:41:31 EDT 2012 kill -USR1 18447 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18447 killed at Mon Mar 26 17:41:31 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:31 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18503 >/dev/null 2>/dev/null selfserv_9280 with PID 18503 found at Mon Mar 26 17:41:31 EDT 2012 selfserv_9280 with PID 18503 started at Mon Mar 26 17:41:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2485: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 18503 at Mon Mar 26 17:41:31 EDT 2012 kill -USR1 18503 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18503 killed at Mon Mar 26 17:41:31 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:31 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18559 >/dev/null 2>/dev/null selfserv_9280 with PID 18559 found at Mon Mar 26 17:41:31 EDT 2012 selfserv_9280 with PID 18559 started at Mon Mar 26 17:41:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2486: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 18559 at Mon Mar 26 17:41:31 EDT 2012 kill -USR1 18559 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18559 killed at Mon Mar 26 17:41:31 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:32 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18627 >/dev/null 2>/dev/null selfserv_9280 with PID 18627 found at Mon Mar 26 17:41:32 EDT 2012 selfserv_9280 with PID 18627 started at Mon Mar 26 17:41:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2487: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 18627 at Mon Mar 26 17:41:32 EDT 2012 kill -USR1 18627 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18627 killed at Mon Mar 26 17:41:32 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:32 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18683 >/dev/null 2>/dev/null selfserv_9280 with PID 18683 found at Mon Mar 26 17:41:32 EDT 2012 selfserv_9280 with PID 18683 started at Mon Mar 26 17:41:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2488: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 18683 at Mon Mar 26 17:41:32 EDT 2012 kill -USR1 18683 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18683 killed at Mon Mar 26 17:41:32 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:32 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18739 >/dev/null 2>/dev/null selfserv_9280 with PID 18739 found at Mon Mar 26 17:41:32 EDT 2012 selfserv_9280 with PID 18739 started at Mon Mar 26 17:41:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2489: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 18739 at Mon Mar 26 17:41:32 EDT 2012 kill -USR1 18739 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18739 killed at Mon Mar 26 17:41:32 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:32 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18807 >/dev/null 2>/dev/null selfserv_9280 with PID 18807 found at Mon Mar 26 17:41:32 EDT 2012 selfserv_9280 with PID 18807 started at Mon Mar 26 17:41:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2490: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 18807 at Mon Mar 26 17:41:32 EDT 2012 kill -USR1 18807 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18807 killed at Mon Mar 26 17:41:32 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:32 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18863 >/dev/null 2>/dev/null selfserv_9280 with PID 18863 found at Mon Mar 26 17:41:32 EDT 2012 selfserv_9280 with PID 18863 started at Mon Mar 26 17:41:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2491: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 18863 at Mon Mar 26 17:41:32 EDT 2012 kill -USR1 18863 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18863 killed at Mon Mar 26 17:41:32 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:32 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18919 >/dev/null 2>/dev/null selfserv_9280 with PID 18919 found at Mon Mar 26 17:41:32 EDT 2012 selfserv_9280 with PID 18919 started at Mon Mar 26 17:41:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2492: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 18919 at Mon Mar 26 17:41:33 EDT 2012 kill -USR1 18919 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18919 killed at Mon Mar 26 17:41:33 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:33 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:33 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18987 >/dev/null 2>/dev/null selfserv_9280 with PID 18987 found at Mon Mar 26 17:41:33 EDT 2012 selfserv_9280 with PID 18987 started at Mon Mar 26 17:41:33 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2493: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 18987 at Mon Mar 26 17:41:33 EDT 2012 kill -USR1 18987 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18987 killed at Mon Mar 26 17:41:33 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:33 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:33 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19043 >/dev/null 2>/dev/null selfserv_9280 with PID 19043 found at Mon Mar 26 17:41:33 EDT 2012 selfserv_9280 with PID 19043 started at Mon Mar 26 17:41:33 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2494: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 19043 at Mon Mar 26 17:41:33 EDT 2012 kill -USR1 19043 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19043 killed at Mon Mar 26 17:41:33 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:33 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:33 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19099 >/dev/null 2>/dev/null selfserv_9280 with PID 19099 found at Mon Mar 26 17:41:33 EDT 2012 selfserv_9280 with PID 19099 started at Mon Mar 26 17:41:33 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2495: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 19099 at Mon Mar 26 17:41:33 EDT 2012 kill -USR1 19099 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19099 killed at Mon Mar 26 17:41:33 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:33 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:33 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19167 >/dev/null 2>/dev/null selfserv_9280 with PID 19167 found at Mon Mar 26 17:41:33 EDT 2012 selfserv_9280 with PID 19167 started at Mon Mar 26 17:41:33 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2496: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 19167 at Mon Mar 26 17:41:33 EDT 2012 kill -USR1 19167 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19167 killed at Mon Mar 26 17:41:33 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:34 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:34 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19223 >/dev/null 2>/dev/null selfserv_9280 with PID 19223 found at Mon Mar 26 17:41:34 EDT 2012 selfserv_9280 with PID 19223 started at Mon Mar 26 17:41:34 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2497: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19223 at Mon Mar 26 17:41:34 EDT 2012 kill -USR1 19223 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19223 killed at Mon Mar 26 17:41:34 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:34 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:34 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19279 >/dev/null 2>/dev/null selfserv_9280 with PID 19279 found at Mon Mar 26 17:41:34 EDT 2012 selfserv_9280 with PID 19279 started at Mon Mar 26 17:41:34 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2498: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 19279 at Mon Mar 26 17:41:34 EDT 2012 kill -USR1 19279 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19279 killed at Mon Mar 26 17:41:34 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:34 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:34 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19347 >/dev/null 2>/dev/null selfserv_9280 with PID 19347 found at Mon Mar 26 17:41:34 EDT 2012 selfserv_9280 with PID 19347 started at Mon Mar 26 17:41:34 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2499: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19347 at Mon Mar 26 17:41:34 EDT 2012 kill -USR1 19347 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19347 killed at Mon Mar 26 17:41:34 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:34 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:34 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19403 >/dev/null 2>/dev/null selfserv_9280 with PID 19403 found at Mon Mar 26 17:41:34 EDT 2012 selfserv_9280 with PID 19403 started at Mon Mar 26 17:41:34 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2500: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19403 at Mon Mar 26 17:41:34 EDT 2012 kill -USR1 19403 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19403 killed at Mon Mar 26 17:41:34 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:34 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:34 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19459 >/dev/null 2>/dev/null selfserv_9280 with PID 19459 found at Mon Mar 26 17:41:34 EDT 2012 selfserv_9280 with PID 19459 started at Mon Mar 26 17:41:34 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2501: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19459 at Mon Mar 26 17:41:34 EDT 2012 kill -USR1 19459 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19459 killed at Mon Mar 26 17:41:34 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:34 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:34 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19527 >/dev/null 2>/dev/null selfserv_9280 with PID 19527 found at Mon Mar 26 17:41:34 EDT 2012 selfserv_9280 with PID 19527 started at Mon Mar 26 17:41:34 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2502: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19527 at Mon Mar 26 17:41:35 EDT 2012 kill -USR1 19527 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19527 killed at Mon Mar 26 17:41:35 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:35 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:35 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19583 >/dev/null 2>/dev/null selfserv_9280 with PID 19583 found at Mon Mar 26 17:41:35 EDT 2012 selfserv_9280 with PID 19583 started at Mon Mar 26 17:41:35 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2503: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19583 at Mon Mar 26 17:41:35 EDT 2012 kill -USR1 19583 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19583 killed at Mon Mar 26 17:41:35 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:35 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:35 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19639 >/dev/null 2>/dev/null selfserv_9280 with PID 19639 found at Mon Mar 26 17:41:35 EDT 2012 selfserv_9280 with PID 19639 started at Mon Mar 26 17:41:35 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2504: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19639 at Mon Mar 26 17:41:35 EDT 2012 kill -USR1 19639 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19639 killed at Mon Mar 26 17:41:35 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:35 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:35 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19707 >/dev/null 2>/dev/null selfserv_9280 with PID 19707 found at Mon Mar 26 17:41:35 EDT 2012 selfserv_9280 with PID 19707 started at Mon Mar 26 17:41:35 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2505: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 19707 at Mon Mar 26 17:41:35 EDT 2012 kill -USR1 19707 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19707 killed at Mon Mar 26 17:41:35 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:35 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:35 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19763 >/dev/null 2>/dev/null selfserv_9280 with PID 19763 found at Mon Mar 26 17:41:35 EDT 2012 selfserv_9280 with PID 19763 started at Mon Mar 26 17:41:35 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2506: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 19763 at Mon Mar 26 17:41:35 EDT 2012 kill -USR1 19763 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19763 killed at Mon Mar 26 17:41:35 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:35 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:35 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19819 >/dev/null 2>/dev/null selfserv_9280 with PID 19819 found at Mon Mar 26 17:41:35 EDT 2012 selfserv_9280 with PID 19819 started at Mon Mar 26 17:41:35 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2507: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 19819 at Mon Mar 26 17:41:36 EDT 2012 kill -USR1 19819 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19819 killed at Mon Mar 26 17:41:36 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:36 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:36 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19887 >/dev/null 2>/dev/null selfserv_9280 with PID 19887 found at Mon Mar 26 17:41:36 EDT 2012 selfserv_9280 with PID 19887 started at Mon Mar 26 17:41:36 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2508: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 19887 at Mon Mar 26 17:41:36 EDT 2012 kill -USR1 19887 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19887 killed at Mon Mar 26 17:41:36 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:36 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:36 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19943 >/dev/null 2>/dev/null selfserv_9280 with PID 19943 found at Mon Mar 26 17:41:36 EDT 2012 selfserv_9280 with PID 19943 started at Mon Mar 26 17:41:36 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2509: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 19943 at Mon Mar 26 17:41:36 EDT 2012 kill -USR1 19943 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19943 killed at Mon Mar 26 17:41:36 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:36 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:36 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19999 >/dev/null 2>/dev/null selfserv_9280 with PID 19999 found at Mon Mar 26 17:41:36 EDT 2012 selfserv_9280 with PID 19999 started at Mon Mar 26 17:41:36 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2510: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 19999 at Mon Mar 26 17:41:36 EDT 2012 kill -USR1 19999 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19999 killed at Mon Mar 26 17:41:36 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:36 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:36 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20067 >/dev/null 2>/dev/null selfserv_9280 with PID 20067 found at Mon Mar 26 17:41:36 EDT 2012 selfserv_9280 with PID 20067 started at Mon Mar 26 17:41:36 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2511: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 20067 at Mon Mar 26 17:41:36 EDT 2012 kill -USR1 20067 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20067 killed at Mon Mar 26 17:41:36 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:36 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:36 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20123 >/dev/null 2>/dev/null selfserv_9280 with PID 20123 found at Mon Mar 26 17:41:36 EDT 2012 selfserv_9280 with PID 20123 started at Mon Mar 26 17:41:36 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2512: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 20123 at Mon Mar 26 17:41:37 EDT 2012 kill -USR1 20123 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20123 killed at Mon Mar 26 17:41:37 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:41:37 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20179 >/dev/null 2>/dev/null selfserv_9280 with PID 20179 found at Mon Mar 26 17:41:37 EDT 2012 selfserv_9280 with PID 20179 started at Mon Mar 26 17:41:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2513: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 20179 at Mon Mar 26 17:41:37 EDT 2012 kill -USR1 20179 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20179 killed at Mon Mar 26 17:41:37 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:37 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20247 >/dev/null 2>/dev/null selfserv_9280 with PID 20247 found at Mon Mar 26 17:41:37 EDT 2012 selfserv_9280 with PID 20247 started at Mon Mar 26 17:41:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2514: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 20247 at Mon Mar 26 17:41:37 EDT 2012 kill -USR1 20247 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20247 killed at Mon Mar 26 17:41:37 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:37 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20303 >/dev/null 2>/dev/null selfserv_9280 with PID 20303 found at Mon Mar 26 17:41:37 EDT 2012 selfserv_9280 with PID 20303 started at Mon Mar 26 17:41:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2515: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 20303 at Mon Mar 26 17:41:37 EDT 2012 kill -USR1 20303 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20303 killed at Mon Mar 26 17:41:37 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:37 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20359 >/dev/null 2>/dev/null selfserv_9280 with PID 20359 found at Mon Mar 26 17:41:37 EDT 2012 selfserv_9280 with PID 20359 started at Mon Mar 26 17:41:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2516: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 20359 at Mon Mar 26 17:41:37 EDT 2012 kill -USR1 20359 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20359 killed at Mon Mar 26 17:41:37 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/authin.tl.tmp 0 selfserv_9280 starting at Mon Mar 26 17:41:37 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:37 EDT 2012 selfserv_9280 with PID 20431 started at Mon Mar 26 17:41:37 EDT 2012 Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:37 EDT 2012 ssl.sh: #2517: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:38 EDT 2012 ssl.sh: #2518: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:38 EDT 2012 ssl.sh: #2519: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:38 EDT 2012 ssl.sh: #2520: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:38 EDT 2012 ssl.sh: #2521: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:38 EDT 2012 ssl.sh: #2522: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:38 EDT 2012 ssl.sh: #2523: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:38 EDT 2012 ssl.sh: #2524: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:38 EDT 2012 ssl.sh: #2525: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:38 EDT 2012 ssl.sh: #2526: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:38 EDT 2012 ssl.sh: #2527: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:38 EDT 2012 ssl.sh: #2528: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:38 EDT 2012 ssl.sh: #2529: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:38 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2530: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:38 EDT 2012 ssl.sh: #2531: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:39 EDT 2012 ssl.sh: #2532: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:39 EDT 2012 ssl.sh: #2533: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:39 EDT 2012 ssl.sh: #2534: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:39 EDT 2012 ssl.sh: #2535: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:39 EDT 2012 ssl.sh: #2536: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:39 EDT 2012 ssl.sh: #2537: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:39 EDT 2012 ssl.sh: #2538: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:39 EDT 2012 ssl.sh: #2539: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:39 EDT 2012 ssl.sh: #2540: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:39 EDT 2012 ssl.sh: #2541: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:39 EDT 2012 ssl.sh: #2542: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:39 EDT 2012 ssl.sh: #2543: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:39 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2544: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:39 EDT 2012 ssl.sh: #2545: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:39 EDT 2012 ssl.sh: #2546: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:40 EDT 2012 ssl.sh: #2547: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:40 EDT 2012 ssl.sh: #2548: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:40 EDT 2012 ssl.sh: #2549: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:40 EDT 2012 ssl.sh: #2550: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:40 EDT 2012 ssl.sh: #2551: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:40 EDT 2012 ssl.sh: #2552: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:40 EDT 2012 ssl.sh: #2553: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:40 EDT 2012 ssl.sh: #2554: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:40 EDT 2012 ssl.sh: #2555: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:40 EDT 2012 ssl.sh: #2556: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20431 >/dev/null 2>/dev/null selfserv_9280 with PID 20431 found at Mon Mar 26 17:41:40 EDT 2012 ssl.sh: #2557: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 20431 at Mon Mar 26 17:41:40 EDT 2012 kill -USR1 20431 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20431 killed at Mon Mar 26 17:41:40 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:40 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:40 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:40 EDT 2012 selfserv_9280 with PID 21857 started at Mon Mar 26 17:41:40 EDT 2012 Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:40 EDT 2012 ssl.sh: #2558: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:41 EDT 2012 ssl.sh: #2559: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:41 EDT 2012 ssl.sh: #2560: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:41 EDT 2012 ssl.sh: #2561: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:41 EDT 2012 ssl.sh: #2562: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:41 EDT 2012 ssl.sh: #2563: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:41 EDT 2012 ssl.sh: #2564: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:41 EDT 2012 ssl.sh: #2565: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:41 EDT 2012 ssl.sh: #2566: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:41 EDT 2012 ssl.sh: #2567: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:41 EDT 2012 ssl.sh: #2568: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:41 EDT 2012 ssl.sh: #2569: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:41 EDT 2012 ssl.sh: #2570: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:41 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2571: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:41 EDT 2012 ssl.sh: #2572: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:42 EDT 2012 ssl.sh: #2573: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:42 EDT 2012 ssl.sh: #2574: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:42 EDT 2012 ssl.sh: #2575: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:42 EDT 2012 ssl.sh: #2576: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:42 EDT 2012 ssl.sh: #2577: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:42 EDT 2012 ssl.sh: #2578: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:42 EDT 2012 ssl.sh: #2579: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:42 EDT 2012 ssl.sh: #2580: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:42 EDT 2012 ssl.sh: #2581: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:42 EDT 2012 ssl.sh: #2582: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:42 EDT 2012 ssl.sh: #2583: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:42 EDT 2012 ssl.sh: #2584: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:42 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2585: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:42 EDT 2012 ssl.sh: #2586: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:43 EDT 2012 ssl.sh: #2587: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:43 EDT 2012 ssl.sh: #2588: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:43 EDT 2012 ssl.sh: #2589: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:43 EDT 2012 ssl.sh: #2590: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:43 EDT 2012 ssl.sh: #2591: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:43 EDT 2012 ssl.sh: #2592: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:43 EDT 2012 ssl.sh: #2593: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:43 EDT 2012 ssl.sh: #2594: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:43 EDT 2012 ssl.sh: #2595: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:43 EDT 2012 ssl.sh: #2596: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:43 EDT 2012 ssl.sh: #2597: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 21857 >/dev/null 2>/dev/null selfserv_9280 with PID 21857 found at Mon Mar 26 17:41:43 EDT 2012 ssl.sh: #2598: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 21857 at Mon Mar 26 17:41:43 EDT 2012 kill -USR1 21857 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 21857 killed at Mon Mar 26 17:41:43 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:43 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23278 >/dev/null 2>/dev/null selfserv_9280 with PID 23278 found at Mon Mar 26 17:41:43 EDT 2012 selfserv_9280 with PID 23278 started at Mon Mar 26 17:41:43 EDT 2012 ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) trying to kill selfserv_9280 with PID 23278 at Mon Mar 26 17:41:43 EDT 2012 kill -USR1 23278 ./ssl.sh: line 207: 23278 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9280 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23278 killed at Mon Mar 26 17:41:43 EDT 2012 selfserv_9280 starting at Mon Mar 26 17:41:43 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:43 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:43 EDT 2012 selfserv_9280 with PID 23320 started at Mon Mar 26 17:41:43 EDT 2012 Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:44 EDT 2012 ssl.sh: #2599: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:44 EDT 2012 ssl.sh: #2600: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:44 EDT 2012 ssl.sh: #2601: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:44 EDT 2012 ssl.sh: #2602: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:44 EDT 2012 ssl.sh: #2603: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:44 EDT 2012 ssl.sh: #2604: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:44 EDT 2012 ssl.sh: #2605: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:44 EDT 2012 ssl.sh: #2606: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:44 EDT 2012 ssl.sh: #2607: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:44 EDT 2012 ssl.sh: #2608: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:44 EDT 2012 ssl.sh: #2609: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:44 EDT 2012 ssl.sh: #2610: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:45 EDT 2012 ssl.sh: #2611: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:45 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2612: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:45 EDT 2012 ssl.sh: #2613: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:45 EDT 2012 ssl.sh: #2614: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:45 EDT 2012 ssl.sh: #2615: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:45 EDT 2012 ssl.sh: #2616: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:45 EDT 2012 ssl.sh: #2617: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:45 EDT 2012 ssl.sh: #2618: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:45 EDT 2012 ssl.sh: #2619: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:45 EDT 2012 ssl.sh: #2620: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:45 EDT 2012 ssl.sh: #2621: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:45 EDT 2012 ssl.sh: #2622: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:45 EDT 2012 ssl.sh: #2623: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:46 EDT 2012 ssl.sh: #2624: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:46 EDT 2012 ssl.sh: #2625: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:46 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2626: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:46 EDT 2012 ssl.sh: #2627: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:46 EDT 2012 ssl.sh: #2628: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:46 EDT 2012 ssl.sh: #2629: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:46 EDT 2012 ssl.sh: #2630: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:46 EDT 2012 ssl.sh: #2631: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:46 EDT 2012 ssl.sh: #2632: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:46 EDT 2012 ssl.sh: #2633: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:46 EDT 2012 ssl.sh: #2634: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:46 EDT 2012 ssl.sh: #2635: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:46 EDT 2012 ssl.sh: #2636: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:46 EDT 2012 ssl.sh: #2637: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:47 EDT 2012 ssl.sh: #2638: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23320 >/dev/null 2>/dev/null selfserv_9280 with PID 23320 found at Mon Mar 26 17:41:47 EDT 2012 ssl.sh: #2639: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 23320 at Mon Mar 26 17:41:47 EDT 2012 kill -USR1 23320 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23320 killed at Mon Mar 26 17:41:47 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:47 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:47 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:47 EDT 2012 selfserv_9280 with PID 24740 started at Mon Mar 26 17:41:47 EDT 2012 Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:47 EDT 2012 ssl.sh: #2640: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:47 EDT 2012 ssl.sh: #2641: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:47 EDT 2012 ssl.sh: #2642: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:47 EDT 2012 ssl.sh: #2643: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:47 EDT 2012 ssl.sh: #2644: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:47 EDT 2012 ssl.sh: #2645: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:47 EDT 2012 ssl.sh: #2646: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:47 EDT 2012 ssl.sh: #2647: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:47 EDT 2012 ssl.sh: #2648: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:48 EDT 2012 ssl.sh: #2649: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:48 EDT 2012 ssl.sh: #2650: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:48 EDT 2012 ssl.sh: #2651: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:48 EDT 2012 ssl.sh: #2652: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:48 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2653: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:48 EDT 2012 ssl.sh: #2654: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:48 EDT 2012 ssl.sh: #2655: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:48 EDT 2012 ssl.sh: #2656: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:48 EDT 2012 ssl.sh: #2657: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:48 EDT 2012 ssl.sh: #2658: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:48 EDT 2012 ssl.sh: #2659: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:48 EDT 2012 ssl.sh: #2660: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:48 EDT 2012 ssl.sh: #2661: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:49 EDT 2012 ssl.sh: #2662: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:49 EDT 2012 ssl.sh: #2663: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:49 EDT 2012 ssl.sh: #2664: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:49 EDT 2012 ssl.sh: #2665: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:49 EDT 2012 ssl.sh: #2666: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:49 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2667: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:49 EDT 2012 ssl.sh: #2668: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:49 EDT 2012 ssl.sh: #2669: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:49 EDT 2012 ssl.sh: #2670: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:49 EDT 2012 ssl.sh: #2671: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:49 EDT 2012 ssl.sh: #2672: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:49 EDT 2012 ssl.sh: #2673: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:49 EDT 2012 ssl.sh: #2674: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:49 EDT 2012 ssl.sh: #2675: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:50 EDT 2012 ssl.sh: #2676: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:50 EDT 2012 ssl.sh: #2677: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:50 EDT 2012 ssl.sh: #2678: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:50 EDT 2012 ssl.sh: #2679: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24740 >/dev/null 2>/dev/null selfserv_9280 with PID 24740 found at Mon Mar 26 17:41:50 EDT 2012 ssl.sh: #2680: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 24740 at Mon Mar 26 17:41:50 EDT 2012 kill -USR1 24740 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24740 killed at Mon Mar 26 17:41:50 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:50 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:50 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26160 >/dev/null 2>/dev/null selfserv_9280 with PID 26160 found at Mon Mar 26 17:41:50 EDT 2012 selfserv_9280 with PID 26160 started at Mon Mar 26 17:41:50 EDT 2012 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9280 with PID 26160 at Mon Mar 26 17:41:50 EDT 2012 kill -USR1 26160 ./ssl.sh: line 207: 26160 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9280 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26160 killed at Mon Mar 26 17:41:50 EDT 2012 selfserv_9280 starting at Mon Mar 26 17:41:50 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:50 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:50 EDT 2012 selfserv_9280 with PID 26202 started at Mon Mar 26 17:41:50 EDT 2012 Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:50 EDT 2012 ssl.sh: #2681: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:50 EDT 2012 ssl.sh: #2682: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:50 EDT 2012 ssl.sh: #2683: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:50 EDT 2012 ssl.sh: #2684: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:50 EDT 2012 ssl.sh: #2685: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:51 EDT 2012 ssl.sh: #2686: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:51 EDT 2012 ssl.sh: #2687: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:51 EDT 2012 ssl.sh: #2688: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:51 EDT 2012 ssl.sh: #2689: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:51 EDT 2012 ssl.sh: #2690: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:51 EDT 2012 ssl.sh: #2691: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:51 EDT 2012 ssl.sh: #2692: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:51 EDT 2012 ssl.sh: #2693: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:51 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2694: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:51 EDT 2012 ssl.sh: #2695: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:51 EDT 2012 ssl.sh: #2696: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:51 EDT 2012 ssl.sh: #2697: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:51 EDT 2012 ssl.sh: #2698: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:52 EDT 2012 ssl.sh: #2699: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:52 EDT 2012 ssl.sh: #2700: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:52 EDT 2012 ssl.sh: #2701: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:52 EDT 2012 ssl.sh: #2702: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:52 EDT 2012 ssl.sh: #2703: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:52 EDT 2012 ssl.sh: #2704: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:52 EDT 2012 ssl.sh: #2705: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:52 EDT 2012 ssl.sh: #2706: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:52 EDT 2012 ssl.sh: #2707: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:52 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2708: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:52 EDT 2012 ssl.sh: #2709: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:52 EDT 2012 ssl.sh: #2710: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:52 EDT 2012 ssl.sh: #2711: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:53 EDT 2012 ssl.sh: #2712: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:53 EDT 2012 ssl.sh: #2713: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:53 EDT 2012 ssl.sh: #2714: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:53 EDT 2012 ssl.sh: #2715: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:53 EDT 2012 ssl.sh: #2716: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:53 EDT 2012 ssl.sh: #2717: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:53 EDT 2012 ssl.sh: #2718: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:53 EDT 2012 ssl.sh: #2719: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:53 EDT 2012 ssl.sh: #2720: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26202 >/dev/null 2>/dev/null selfserv_9280 with PID 26202 found at Mon Mar 26 17:41:53 EDT 2012 ssl.sh: #2721: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 26202 at Mon Mar 26 17:41:53 EDT 2012 kill -USR1 26202 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26202 killed at Mon Mar 26 17:41:53 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:53 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:53 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:53 EDT 2012 selfserv_9280 with PID 27622 started at Mon Mar 26 17:41:53 EDT 2012 Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:53 EDT 2012 ssl.sh: #2722: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: #2723: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: #2724: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: #2725: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: #2726: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: #2727: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: #2728: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: #2729: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: #2730: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: #2731: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: #2732: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: #2733: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:54 EDT 2012 ssl.sh: #2734: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:55 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2735: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: #2736: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: #2737: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: #2738: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: #2739: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: #2740: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: #2741: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: #2742: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: #2743: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: #2744: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: #2745: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: #2746: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:55 EDT 2012 ssl.sh: #2747: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: #2748: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:56 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #2749: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: #2750: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: #2751: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: #2752: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: #2753: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: #2754: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: #2755: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: #2756: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: #2757: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: #2758: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: #2759: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:56 EDT 2012 ssl.sh: #2760: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:57 EDT 2012 ssl.sh: #2761: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27622 >/dev/null 2>/dev/null selfserv_9280 with PID 27622 found at Mon Mar 26 17:41:57 EDT 2012 ssl.sh: #2762: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27622 at Mon Mar 26 17:41:57 EDT 2012 kill -USR1 27622 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27622 killed at Mon Mar 26 17:41:57 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:41:57 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29042 >/dev/null 2>/dev/null selfserv_9280 with PID 29042 found at Mon Mar 26 17:41:57 EDT 2012 selfserv_9280 with PID 29042 started at Mon Mar 26 17:41:57 EDT 2012 ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9280 with PID 29042 at Mon Mar 26 17:41:57 EDT 2012 kill -USR1 29042 ./ssl.sh: line 207: 29042 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9280 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29042 killed at Mon Mar 26 17:41:57 EDT 2012 ssl.sh: SSL Cipher Coverage - server bypass/client bypass =============================== selfserv_9280 starting at Mon Mar 26 17:41:57 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:57 EDT 2012 selfserv_9280 with PID 29090 started at Mon Mar 26 17:41:57 EDT 2012 ssl.sh: running SSL2_RC4_128_WITH_MD5 ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c A -T -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2763: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c B -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2764: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c C -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2765: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c D -T -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2766: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c E -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2767: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c F -T -O -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2768: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2769: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2770: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2771: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c f -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2772: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c g -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2773: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2774: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2775: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2776: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c l -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2777: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c m -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2778: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2779: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2780: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2781: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -T -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2782: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2783: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2784: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2785: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c f -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2786: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c g -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2787: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2788: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2789: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2790: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c l -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2791: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c m -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2792: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2793: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2794: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2795: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 29090 >/dev/null 2>/dev/null selfserv_9280 with PID 29090 found at Mon Mar 26 17:41:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2796: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9280 with PID 29090 at Mon Mar 26 17:41:59 EDT 2012 kill -USR1 29090 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29090 killed at Mon Mar 26 17:41:59 EDT 2012 ssl.sh: SSL Client Authentication - server bypass/client bypass =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:00 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 30676 >/dev/null 2>/dev/null selfserv_9280 with PID 30676 found at Mon Mar 26 17:42:00 EDT 2012 selfserv_9280 with PID 30676 started at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2797: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 30676 at Mon Mar 26 17:42:00 EDT 2012 kill -USR1 30676 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 30676 killed at Mon Mar 26 17:42:00 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:42:00 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 30733 >/dev/null 2>/dev/null selfserv_9280 with PID 30733 found at Mon Mar 26 17:42:00 EDT 2012 selfserv_9280 with PID 30733 started at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2798: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 30733 at Mon Mar 26 17:42:00 EDT 2012 kill -USR1 30733 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 30733 killed at Mon Mar 26 17:42:00 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:00 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 30790 >/dev/null 2>/dev/null selfserv_9280 with PID 30790 found at Mon Mar 26 17:42:00 EDT 2012 selfserv_9280 with PID 30790 started at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2799: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 30790 at Mon Mar 26 17:42:00 EDT 2012 kill -USR1 30790 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 30790 killed at Mon Mar 26 17:42:00 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:00 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 30847 >/dev/null 2>/dev/null selfserv_9280 with PID 30847 found at Mon Mar 26 17:42:00 EDT 2012 selfserv_9280 with PID 30847 started at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2800: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 30847 at Mon Mar 26 17:42:00 EDT 2012 kill -USR1 30847 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 30847 killed at Mon Mar 26 17:42:00 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:42:00 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 30904 >/dev/null 2>/dev/null selfserv_9280 with PID 30904 found at Mon Mar 26 17:42:00 EDT 2012 selfserv_9280 with PID 30904 started at Mon Mar 26 17:42:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2801: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 30904 at Mon Mar 26 17:42:01 EDT 2012 kill -USR1 30904 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 30904 killed at Mon Mar 26 17:42:01 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:01 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 30961 >/dev/null 2>/dev/null selfserv_9280 with PID 30961 found at Mon Mar 26 17:42:01 EDT 2012 selfserv_9280 with PID 30961 started at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2802: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 30961 at Mon Mar 26 17:42:01 EDT 2012 kill -USR1 30961 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 30961 killed at Mon Mar 26 17:42:01 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:01 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31018 >/dev/null 2>/dev/null selfserv_9280 with PID 31018 found at Mon Mar 26 17:42:01 EDT 2012 selfserv_9280 with PID 31018 started at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2803: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 31018 at Mon Mar 26 17:42:01 EDT 2012 kill -USR1 31018 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31018 killed at Mon Mar 26 17:42:01 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:42:01 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31075 >/dev/null 2>/dev/null selfserv_9280 with PID 31075 found at Mon Mar 26 17:42:01 EDT 2012 selfserv_9280 with PID 31075 started at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2804: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 31075 at Mon Mar 26 17:42:01 EDT 2012 kill -USR1 31075 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31075 killed at Mon Mar 26 17:42:01 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:01 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31132 >/dev/null 2>/dev/null selfserv_9280 with PID 31132 found at Mon Mar 26 17:42:01 EDT 2012 selfserv_9280 with PID 31132 started at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2805: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 31132 at Mon Mar 26 17:42:01 EDT 2012 kill -USR1 31132 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31132 killed at Mon Mar 26 17:42:01 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:01 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31189 >/dev/null 2>/dev/null selfserv_9280 with PID 31189 found at Mon Mar 26 17:42:01 EDT 2012 selfserv_9280 with PID 31189 started at Mon Mar 26 17:42:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2806: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 31189 at Mon Mar 26 17:42:02 EDT 2012 kill -USR1 31189 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31189 killed at Mon Mar 26 17:42:02 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:42:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31246 >/dev/null 2>/dev/null selfserv_9280 with PID 31246 found at Mon Mar 26 17:42:02 EDT 2012 selfserv_9280 with PID 31246 started at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2807: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 31246 at Mon Mar 26 17:42:02 EDT 2012 kill -USR1 31246 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31246 killed at Mon Mar 26 17:42:02 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31303 >/dev/null 2>/dev/null selfserv_9280 with PID 31303 found at Mon Mar 26 17:42:02 EDT 2012 selfserv_9280 with PID 31303 started at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2808: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 31303 at Mon Mar 26 17:42:02 EDT 2012 kill -USR1 31303 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31303 killed at Mon Mar 26 17:42:02 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31360 >/dev/null 2>/dev/null selfserv_9280 with PID 31360 found at Mon Mar 26 17:42:02 EDT 2012 selfserv_9280 with PID 31360 started at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2809: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 31360 at Mon Mar 26 17:42:02 EDT 2012 kill -USR1 31360 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31360 killed at Mon Mar 26 17:42:02 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:42:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31417 >/dev/null 2>/dev/null selfserv_9280 with PID 31417 found at Mon Mar 26 17:42:02 EDT 2012 selfserv_9280 with PID 31417 started at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2810: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 31417 at Mon Mar 26 17:42:02 EDT 2012 kill -USR1 31417 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31417 killed at Mon Mar 26 17:42:02 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31474 >/dev/null 2>/dev/null selfserv_9280 with PID 31474 found at Mon Mar 26 17:42:02 EDT 2012 selfserv_9280 with PID 31474 started at Mon Mar 26 17:42:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2811: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 31474 at Mon Mar 26 17:42:03 EDT 2012 kill -USR1 31474 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31474 killed at Mon Mar 26 17:42:03 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31531 >/dev/null 2>/dev/null selfserv_9280 with PID 31531 found at Mon Mar 26 17:42:03 EDT 2012 selfserv_9280 with PID 31531 started at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2812: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 31531 at Mon Mar 26 17:42:03 EDT 2012 kill -USR1 31531 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31531 killed at Mon Mar 26 17:42:03 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:42:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31588 >/dev/null 2>/dev/null selfserv_9280 with PID 31588 found at Mon Mar 26 17:42:03 EDT 2012 selfserv_9280 with PID 31588 started at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2813: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 31588 at Mon Mar 26 17:42:03 EDT 2012 kill -USR1 31588 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31588 killed at Mon Mar 26 17:42:03 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31645 >/dev/null 2>/dev/null selfserv_9280 with PID 31645 found at Mon Mar 26 17:42:03 EDT 2012 selfserv_9280 with PID 31645 started at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2814: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 31645 at Mon Mar 26 17:42:03 EDT 2012 kill -USR1 31645 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31645 killed at Mon Mar 26 17:42:03 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31702 >/dev/null 2>/dev/null selfserv_9280 with PID 31702 found at Mon Mar 26 17:42:03 EDT 2012 selfserv_9280 with PID 31702 started at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2815: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 31702 at Mon Mar 26 17:42:03 EDT 2012 kill -USR1 31702 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31702 killed at Mon Mar 26 17:42:03 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:42:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31759 >/dev/null 2>/dev/null selfserv_9280 with PID 31759 found at Mon Mar 26 17:42:03 EDT 2012 selfserv_9280 with PID 31759 started at Mon Mar 26 17:42:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2816: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 31759 at Mon Mar 26 17:42:04 EDT 2012 kill -USR1 31759 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31759 killed at Mon Mar 26 17:42:04 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31816 >/dev/null 2>/dev/null selfserv_9280 with PID 31816 found at Mon Mar 26 17:42:04 EDT 2012 selfserv_9280 with PID 31816 started at Mon Mar 26 17:42:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2817: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 31816 at Mon Mar 26 17:42:04 EDT 2012 kill -USR1 31816 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31816 killed at Mon Mar 26 17:42:04 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31873 >/dev/null 2>/dev/null selfserv_9280 with PID 31873 found at Mon Mar 26 17:42:04 EDT 2012 selfserv_9280 with PID 31873 started at Mon Mar 26 17:42:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2818: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 31873 at Mon Mar 26 17:42:04 EDT 2012 kill -USR1 31873 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31873 killed at Mon Mar 26 17:42:04 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:42:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31930 >/dev/null 2>/dev/null selfserv_9280 with PID 31930 found at Mon Mar 26 17:42:04 EDT 2012 selfserv_9280 with PID 31930 started at Mon Mar 26 17:42:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2819: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 31930 at Mon Mar 26 17:42:04 EDT 2012 kill -USR1 31930 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31930 killed at Mon Mar 26 17:42:04 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31987 >/dev/null 2>/dev/null selfserv_9280 with PID 31987 found at Mon Mar 26 17:42:04 EDT 2012 selfserv_9280 with PID 31987 started at Mon Mar 26 17:42:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2820: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 31987 at Mon Mar 26 17:42:04 EDT 2012 kill -USR1 31987 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31987 killed at Mon Mar 26 17:42:04 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: TLS Server hello response without SNI ---- selfserv_9280 starting at Mon Mar 26 17:42:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32112 >/dev/null 2>/dev/null selfserv_9280 with PID 32112 found at Mon Mar 26 17:42:05 EDT 2012 selfserv_9280 with PID 32112 started at Mon Mar 26 17:42:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2821: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 32112 at Mon Mar 26 17:42:05 EDT 2012 kill -USR1 32112 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32112 killed at Mon Mar 26 17:42:05 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9280 starting at Mon Mar 26 17:42:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32175 >/dev/null 2>/dev/null selfserv_9280 with PID 32175 found at Mon Mar 26 17:42:05 EDT 2012 selfserv_9280 with PID 32175 started at Mon Mar 26 17:42:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2822: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 32175 at Mon Mar 26 17:42:05 EDT 2012 kill -USR1 32175 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32175 killed at Mon Mar 26 17:42:05 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9280 starting at Mon Mar 26 17:42:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32238 >/dev/null 2>/dev/null selfserv_9280 with PID 32238 found at Mon Mar 26 17:42:05 EDT 2012 selfserv_9280 with PID 32238 started at Mon Mar 26 17:42:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #2823: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 32238 at Mon Mar 26 17:42:05 EDT 2012 kill -USR1 32238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32238 killed at Mon Mar 26 17:42:05 EDT 2012 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9280 starting at Mon Mar 26 17:42:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32301 >/dev/null 2>/dev/null selfserv_9280 with PID 32301 found at Mon Mar 26 17:42:05 EDT 2012 selfserv_9280 with PID 32301 started at Mon Mar 26 17:42:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2824: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 32301 at Mon Mar 26 17:42:05 EDT 2012 kill -USR1 32301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32301 killed at Mon Mar 26 17:42:05 EDT 2012 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9280 starting at Mon Mar 26 17:42:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32364 >/dev/null 2>/dev/null selfserv_9280 with PID 32364 found at Mon Mar 26 17:42:05 EDT 2012 selfserv_9280 with PID 32364 started at Mon Mar 26 17:42:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #2825: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 32364 at Mon Mar 26 17:42:06 EDT 2012 kill -USR1 32364 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32364 killed at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: TLS Server hello response without SNI ---- selfserv_9280 starting at Mon Mar 26 17:42:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32427 >/dev/null 2>/dev/null selfserv_9280 with PID 32427 found at Mon Mar 26 17:42:06 EDT 2012 selfserv_9280 with PID 32427 started at Mon Mar 26 17:42:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2826: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 32427 at Mon Mar 26 17:42:06 EDT 2012 kill -USR1 32427 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32427 killed at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: TLS Server hello response with SNI ---- selfserv_9280 starting at Mon Mar 26 17:42:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32490 >/dev/null 2>/dev/null selfserv_9280 with PID 32490 found at Mon Mar 26 17:42:06 EDT 2012 selfserv_9280 with PID 32490 started at Mon Mar 26 17:42:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2827: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 32490 at Mon Mar 26 17:42:06 EDT 2012 kill -USR1 32490 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32490 killed at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9280 starting at Mon Mar 26 17:42:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32553 >/dev/null 2>/dev/null selfserv_9280 with PID 32553 found at Mon Mar 26 17:42:06 EDT 2012 selfserv_9280 with PID 32553 started at Mon Mar 26 17:42:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #2828: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 32553 at Mon Mar 26 17:42:06 EDT 2012 kill -USR1 32553 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32553 killed at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9280 starting at Mon Mar 26 17:42:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32616 >/dev/null 2>/dev/null selfserv_9280 with PID 32616 found at Mon Mar 26 17:42:06 EDT 2012 selfserv_9280 with PID 32616 started at Mon Mar 26 17:42:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #2829: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 32616 at Mon Mar 26 17:42:06 EDT 2012 kill -USR1 32616 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32616 killed at Mon Mar 26 17:42:06 EDT 2012 ssl.sh: TLS Server response with alert ---- selfserv_9280 starting at Mon Mar 26 17:42:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32679 >/dev/null 2>/dev/null selfserv_9280 with PID 32679 found at Mon Mar 26 17:42:06 EDT 2012 selfserv_9280 with PID 32679 started at Mon Mar 26 17:42:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #2830: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 32679 at Mon Mar 26 17:42:06 EDT 2012 kill -USR1 32679 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32679 killed at Mon Mar 26 17:42:07 EDT 2012 ssl.sh: SSL Stress Test - server bypass/client bypass =============================== ssl.sh: Stress SSL2 RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:42:07 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 563 >/dev/null 2>/dev/null selfserv_9280 with PID 563 found at Mon Mar 26 17:42:07 EDT 2012 selfserv_9280 with PID 563 started at Mon Mar 26 17:42:07 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 1000 -C A \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:07 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: SSL2 - 1 server certificates tested. strsclnt completed at Mon Mar 26 17:42:07 EDT 2012 ssl.sh: #2831: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 563 at Mon Mar 26 17:42:07 EDT 2012 kill -USR1 563 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 563 killed at Mon Mar 26 17:42:07 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:42:07 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 640 >/dev/null 2>/dev/null selfserv_9280 with PID 640 found at Mon Mar 26 17:42:07 EDT 2012 selfserv_9280 with PID 640 started at Mon Mar 26 17:42:07 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:07 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:08 EDT 2012 ssl.sh: #2832: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 640 at Mon Mar 26 17:42:08 EDT 2012 kill -USR1 640 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 640 killed at Mon Mar 26 17:42:08 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:42:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 716 >/dev/null 2>/dev/null selfserv_9280 with PID 716 found at Mon Mar 26 17:42:08 EDT 2012 selfserv_9280 with PID 716 started at Mon Mar 26 17:42:08 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:08 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:08 EDT 2012 ssl.sh: #2833: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 716 at Mon Mar 26 17:42:08 EDT 2012 kill -USR1 716 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 716 killed at Mon Mar 26 17:42:08 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9280 starting at Mon Mar 26 17:42:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 794 >/dev/null 2>/dev/null selfserv_9280 with PID 794 found at Mon Mar 26 17:42:08 EDT 2012 selfserv_9280 with PID 794 started at Mon Mar 26 17:42:08 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:09 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:09 EDT 2012 ssl.sh: #2834: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 794 at Mon Mar 26 17:42:09 EDT 2012 kill -USR1 794 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 794 killed at Mon Mar 26 17:42:09 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9280 starting at Mon Mar 26 17:42:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 870 >/dev/null 2>/dev/null selfserv_9280 with PID 870 found at Mon Mar 26 17:42:09 EDT 2012 selfserv_9280 with PID 870 started at Mon Mar 26 17:42:09 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:09 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:09 EDT 2012 ssl.sh: #2835: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 870 at Mon Mar 26 17:42:10 EDT 2012 kill -USR1 870 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 870 killed at Mon Mar 26 17:42:10 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9280 starting at Mon Mar 26 17:42:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 946 >/dev/null 2>/dev/null selfserv_9280 with PID 946 found at Mon Mar 26 17:42:10 EDT 2012 selfserv_9280 with PID 946 started at Mon Mar 26 17:42:10 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:10 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:10 EDT 2012 ssl.sh: #2836: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 946 at Mon Mar 26 17:42:10 EDT 2012 kill -USR1 946 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 946 killed at Mon Mar 26 17:42:10 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9280 starting at Mon Mar 26 17:42:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1023 >/dev/null 2>/dev/null selfserv_9280 with PID 1023 found at Mon Mar 26 17:42:10 EDT 2012 selfserv_9280 with PID 1023 started at Mon Mar 26 17:42:10 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:10 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:11 EDT 2012 ssl.sh: #2837: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1023 at Mon Mar 26 17:42:11 EDT 2012 kill -USR1 1023 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1023 killed at Mon Mar 26 17:42:11 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9280 starting at Mon Mar 26 17:42:11 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1103 >/dev/null 2>/dev/null selfserv_9280 with PID 1103 found at Mon Mar 26 17:42:11 EDT 2012 selfserv_9280 with PID 1103 started at Mon Mar 26 17:42:11 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:11 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:12 EDT 2012 ssl.sh: #2838: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1103 at Mon Mar 26 17:42:12 EDT 2012 kill -USR1 1103 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1103 killed at Mon Mar 26 17:42:12 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9280 starting at Mon Mar 26 17:42:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1193 >/dev/null 2>/dev/null selfserv_9280 with PID 1193 found at Mon Mar 26 17:42:12 EDT 2012 selfserv_9280 with PID 1193 started at Mon Mar 26 17:42:12 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:12 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:12 EDT 2012 ssl.sh: #2839: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1193 at Mon Mar 26 17:42:12 EDT 2012 kill -USR1 1193 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1193 killed at Mon Mar 26 17:42:12 EDT 2012 ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1292 >/dev/null 2>/dev/null selfserv_9280 with PID 1292 found at Mon Mar 26 17:42:12 EDT 2012 selfserv_9280 with PID 1292 started at Mon Mar 26 17:42:12 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:12 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: SSL2 - 100 server certificates tested. strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:42:13 EDT 2012 ssl.sh: #2840: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1292 at Mon Mar 26 17:42:13 EDT 2012 kill -USR1 1292 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1292 killed at Mon Mar 26 17:42:13 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:13 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1377 >/dev/null 2>/dev/null selfserv_9280 with PID 1377 found at Mon Mar 26 17:42:13 EDT 2012 selfserv_9280 with PID 1377 started at Mon Mar 26 17:42:13 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:13 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:42:14 EDT 2012 ssl.sh: #2841: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1377 at Mon Mar 26 17:42:14 EDT 2012 kill -USR1 1377 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1377 killed at Mon Mar 26 17:42:14 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1454 >/dev/null 2>/dev/null selfserv_9280 with PID 1454 found at Mon Mar 26 17:42:14 EDT 2012 selfserv_9280 with PID 1454 started at Mon Mar 26 17:42:14 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:14 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:42:14 EDT 2012 ssl.sh: #2842: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1454 at Mon Mar 26 17:42:14 EDT 2012 kill -USR1 1454 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1454 killed at Mon Mar 26 17:42:14 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1529 >/dev/null 2>/dev/null selfserv_9280 with PID 1529 found at Mon Mar 26 17:42:14 EDT 2012 selfserv_9280 with PID 1529 started at Mon Mar 26 17:42:14 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:14 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: #2843: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1529 at Mon Mar 26 17:42:15 EDT 2012 kill -USR1 1529 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1529 killed at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1620 >/dev/null 2>/dev/null selfserv_9280 with PID 1620 found at Mon Mar 26 17:42:15 EDT 2012 selfserv_9280 with PID 1620 started at Mon Mar 26 17:42:15 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:15 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: #2844: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1620 at Mon Mar 26 17:42:15 EDT 2012 kill -USR1 1620 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1620 killed at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:42:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1696 >/dev/null 2>/dev/null selfserv_9280 with PID 1696 found at Mon Mar 26 17:42:15 EDT 2012 selfserv_9280 with PID 1696 started at Mon Mar 26 17:42:15 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:15 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: #2845: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1696 at Mon Mar 26 17:42:15 EDT 2012 kill -USR1 1696 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1696 killed at Mon Mar 26 17:42:15 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1772 >/dev/null 2>/dev/null selfserv_9280 with PID 1772 found at Mon Mar 26 17:42:15 EDT 2012 selfserv_9280 with PID 1772 started at Mon Mar 26 17:42:15 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:15 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: #2846: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1772 at Mon Mar 26 17:42:16 EDT 2012 kill -USR1 1772 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1772 killed at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:42:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1848 >/dev/null 2>/dev/null selfserv_9280 with PID 1848 found at Mon Mar 26 17:42:16 EDT 2012 selfserv_9280 with PID 1848 started at Mon Mar 26 17:42:16 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: #2847: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1848 at Mon Mar 26 17:42:16 EDT 2012 kill -USR1 1848 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1848 killed at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9280 starting at Mon Mar 26 17:42:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1930 >/dev/null 2>/dev/null selfserv_9280 with PID 1930 found at Mon Mar 26 17:42:16 EDT 2012 selfserv_9280 with PID 1930 started at Mon Mar 26 17:42:16 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: #2848: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 1930 at Mon Mar 26 17:42:16 EDT 2012 kill -USR1 1930 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1930 killed at Mon Mar 26 17:42:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9280 starting at Mon Mar 26 17:42:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 2012 >/dev/null 2>/dev/null selfserv_9280 with PID 2012 found at Mon Mar 26 17:42:17 EDT 2012 selfserv_9280 with PID 2012 started at Mon Mar 26 17:42:17 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:17 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:17 EDT 2012 ssl.sh: #2849: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 2012 at Mon Mar 26 17:42:17 EDT 2012 kill -USR1 2012 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 2012 killed at Mon Mar 26 17:42:17 EDT 2012 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client bypass =============================== selfserv_9280 starting at Mon Mar 26 17:42:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:17 EDT 2012 selfserv_9280 with PID 2165 started at Mon Mar 26 17:42:17 EDT 2012 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2850: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2851: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2852: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c f -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2853: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c g -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2854: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2855: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2856: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2857: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c l -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2858: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c m -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2859: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2860: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2861: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2862: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -T -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2863: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c c -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2864: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c d -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2865: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c e -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2866: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c f -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2867: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c g -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2868: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c i -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2869: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c j -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2870: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c k -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2871: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c l -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2872: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c m -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2873: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c n -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2874: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c v -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2875: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c y -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2876: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 2165 >/dev/null 2>/dev/null selfserv_9280 with PID 2165 found at Mon Mar 26 17:42:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -c z -2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2877: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9280 with PID 2165 at Mon Mar 26 17:42:19 EDT 2012 kill -USR1 2165 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 2165 killed at Mon Mar 26 17:42:19 EDT 2012 ssl.sh: SSL Client Authentication Extended Test - server bypass/client bypass =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:20 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 3633 >/dev/null 2>/dev/null selfserv_9280 with PID 3633 found at Mon Mar 26 17:42:20 EDT 2012 selfserv_9280 with PID 3633 started at Mon Mar 26 17:42:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2878: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 3633 at Mon Mar 26 17:42:20 EDT 2012 kill -USR1 3633 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 3633 killed at Mon Mar 26 17:42:20 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:42:20 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 3690 >/dev/null 2>/dev/null selfserv_9280 with PID 3690 found at Mon Mar 26 17:42:20 EDT 2012 selfserv_9280 with PID 3690 started at Mon Mar 26 17:42:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2879: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 3690 at Mon Mar 26 17:42:20 EDT 2012 kill -USR1 3690 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 3690 killed at Mon Mar 26 17:42:20 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:20 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 3747 >/dev/null 2>/dev/null selfserv_9280 with PID 3747 found at Mon Mar 26 17:42:20 EDT 2012 selfserv_9280 with PID 3747 started at Mon Mar 26 17:42:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2880: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 3747 at Mon Mar 26 17:42:20 EDT 2012 kill -USR1 3747 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 3747 killed at Mon Mar 26 17:42:20 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:20 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 3804 >/dev/null 2>/dev/null selfserv_9280 with PID 3804 found at Mon Mar 26 17:42:20 EDT 2012 selfserv_9280 with PID 3804 started at Mon Mar 26 17:42:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2881: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 3804 at Mon Mar 26 17:42:21 EDT 2012 kill -USR1 3804 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 3804 killed at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:42:21 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 3861 >/dev/null 2>/dev/null selfserv_9280 with PID 3861 found at Mon Mar 26 17:42:21 EDT 2012 selfserv_9280 with PID 3861 started at Mon Mar 26 17:42:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2882: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 3861 at Mon Mar 26 17:42:21 EDT 2012 kill -USR1 3861 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 3861 killed at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:21 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 3918 >/dev/null 2>/dev/null selfserv_9280 with PID 3918 found at Mon Mar 26 17:42:21 EDT 2012 selfserv_9280 with PID 3918 started at Mon Mar 26 17:42:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2883: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 3918 at Mon Mar 26 17:42:21 EDT 2012 kill -USR1 3918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 3918 killed at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:21 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 3975 >/dev/null 2>/dev/null selfserv_9280 with PID 3975 found at Mon Mar 26 17:42:21 EDT 2012 selfserv_9280 with PID 3975 started at Mon Mar 26 17:42:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2884: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 3975 at Mon Mar 26 17:42:21 EDT 2012 kill -USR1 3975 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 3975 killed at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:42:21 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4032 >/dev/null 2>/dev/null selfserv_9280 with PID 4032 found at Mon Mar 26 17:42:21 EDT 2012 selfserv_9280 with PID 4032 started at Mon Mar 26 17:42:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2885: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4032 at Mon Mar 26 17:42:21 EDT 2012 kill -USR1 4032 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4032 killed at Mon Mar 26 17:42:21 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:21 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4089 >/dev/null 2>/dev/null selfserv_9280 with PID 4089 found at Mon Mar 26 17:42:21 EDT 2012 selfserv_9280 with PID 4089 started at Mon Mar 26 17:42:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2886: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4089 at Mon Mar 26 17:42:22 EDT 2012 kill -USR1 4089 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4089 killed at Mon Mar 26 17:42:22 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:22 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4146 >/dev/null 2>/dev/null selfserv_9280 with PID 4146 found at Mon Mar 26 17:42:22 EDT 2012 selfserv_9280 with PID 4146 started at Mon Mar 26 17:42:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2887: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 4146 at Mon Mar 26 17:42:22 EDT 2012 kill -USR1 4146 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4146 killed at Mon Mar 26 17:42:22 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:42:22 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4203 >/dev/null 2>/dev/null selfserv_9280 with PID 4203 found at Mon Mar 26 17:42:22 EDT 2012 selfserv_9280 with PID 4203 started at Mon Mar 26 17:42:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2888: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 4203 at Mon Mar 26 17:42:22 EDT 2012 kill -USR1 4203 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4203 killed at Mon Mar 26 17:42:22 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:22 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4260 >/dev/null 2>/dev/null selfserv_9280 with PID 4260 found at Mon Mar 26 17:42:22 EDT 2012 selfserv_9280 with PID 4260 started at Mon Mar 26 17:42:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2889: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4260 at Mon Mar 26 17:42:22 EDT 2012 kill -USR1 4260 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4260 killed at Mon Mar 26 17:42:22 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:22 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4317 >/dev/null 2>/dev/null selfserv_9280 with PID 4317 found at Mon Mar 26 17:42:22 EDT 2012 selfserv_9280 with PID 4317 started at Mon Mar 26 17:42:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2890: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4317 at Mon Mar 26 17:42:22 EDT 2012 kill -USR1 4317 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4317 killed at Mon Mar 26 17:42:22 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:42:22 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4374 >/dev/null 2>/dev/null selfserv_9280 with PID 4374 found at Mon Mar 26 17:42:22 EDT 2012 selfserv_9280 with PID 4374 started at Mon Mar 26 17:42:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2891: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4374 at Mon Mar 26 17:42:22 EDT 2012 kill -USR1 4374 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4374 killed at Mon Mar 26 17:42:22 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:22 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4431 >/dev/null 2>/dev/null selfserv_9280 with PID 4431 found at Mon Mar 26 17:42:23 EDT 2012 selfserv_9280 with PID 4431 started at Mon Mar 26 17:42:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2892: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4431 at Mon Mar 26 17:42:23 EDT 2012 kill -USR1 4431 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4431 killed at Mon Mar 26 17:42:23 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4488 >/dev/null 2>/dev/null selfserv_9280 with PID 4488 found at Mon Mar 26 17:42:23 EDT 2012 selfserv_9280 with PID 4488 started at Mon Mar 26 17:42:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2893: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 4488 at Mon Mar 26 17:42:23 EDT 2012 kill -USR1 4488 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4488 killed at Mon Mar 26 17:42:23 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:42:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4545 >/dev/null 2>/dev/null selfserv_9280 with PID 4545 found at Mon Mar 26 17:42:23 EDT 2012 selfserv_9280 with PID 4545 started at Mon Mar 26 17:42:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2894: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 4545 at Mon Mar 26 17:42:23 EDT 2012 kill -USR1 4545 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4545 killed at Mon Mar 26 17:42:23 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4602 >/dev/null 2>/dev/null selfserv_9280 with PID 4602 found at Mon Mar 26 17:42:23 EDT 2012 selfserv_9280 with PID 4602 started at Mon Mar 26 17:42:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2895: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4602 at Mon Mar 26 17:42:23 EDT 2012 kill -USR1 4602 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4602 killed at Mon Mar 26 17:42:23 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4659 >/dev/null 2>/dev/null selfserv_9280 with PID 4659 found at Mon Mar 26 17:42:23 EDT 2012 selfserv_9280 with PID 4659 started at Mon Mar 26 17:42:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2896: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4659 at Mon Mar 26 17:42:23 EDT 2012 kill -USR1 4659 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4659 killed at Mon Mar 26 17:42:23 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:42:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4716 >/dev/null 2>/dev/null selfserv_9280 with PID 4716 found at Mon Mar 26 17:42:24 EDT 2012 selfserv_9280 with PID 4716 started at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2897: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4716 at Mon Mar 26 17:42:24 EDT 2012 kill -USR1 4716 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4716 killed at Mon Mar 26 17:42:24 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4773 >/dev/null 2>/dev/null selfserv_9280 with PID 4773 found at Mon Mar 26 17:42:24 EDT 2012 selfserv_9280 with PID 4773 started at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2898: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4773 at Mon Mar 26 17:42:24 EDT 2012 kill -USR1 4773 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4773 killed at Mon Mar 26 17:42:24 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4830 >/dev/null 2>/dev/null selfserv_9280 with PID 4830 found at Mon Mar 26 17:42:24 EDT 2012 selfserv_9280 with PID 4830 started at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2899: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 4830 at Mon Mar 26 17:42:24 EDT 2012 kill -USR1 4830 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4830 killed at Mon Mar 26 17:42:24 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:42:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4887 >/dev/null 2>/dev/null selfserv_9280 with PID 4887 found at Mon Mar 26 17:42:24 EDT 2012 selfserv_9280 with PID 4887 started at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2900: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 4887 at Mon Mar 26 17:42:24 EDT 2012 kill -USR1 4887 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4887 killed at Mon Mar 26 17:42:24 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4944 >/dev/null 2>/dev/null selfserv_9280 with PID 4944 found at Mon Mar 26 17:42:24 EDT 2012 selfserv_9280 with PID 4944 started at Mon Mar 26 17:42:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2901: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 4944 at Mon Mar 26 17:42:24 EDT 2012 kill -USR1 4944 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4944 killed at Mon Mar 26 17:42:24 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:42:25 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5391 >/dev/null 2>/dev/null selfserv_9280 with PID 5391 found at Mon Mar 26 17:42:25 EDT 2012 selfserv_9280 with PID 5391 started at Mon Mar 26 17:42:25 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:25 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:25 EDT 2012 ssl.sh: #2902: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5391 at Mon Mar 26 17:42:25 EDT 2012 kill -USR1 5391 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5391 killed at Mon Mar 26 17:42:25 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:42:25 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5467 >/dev/null 2>/dev/null selfserv_9280 with PID 5467 found at Mon Mar 26 17:42:25 EDT 2012 selfserv_9280 with PID 5467 started at Mon Mar 26 17:42:25 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:25 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:26 EDT 2012 ssl.sh: #2903: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5467 at Mon Mar 26 17:42:26 EDT 2012 kill -USR1 5467 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5467 killed at Mon Mar 26 17:42:26 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9280 starting at Mon Mar 26 17:42:26 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5543 >/dev/null 2>/dev/null selfserv_9280 with PID 5543 found at Mon Mar 26 17:42:26 EDT 2012 selfserv_9280 with PID 5543 started at Mon Mar 26 17:42:26 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:26 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:26 EDT 2012 ssl.sh: #2904: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5543 at Mon Mar 26 17:42:26 EDT 2012 kill -USR1 5543 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5543 killed at Mon Mar 26 17:42:27 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9280 starting at Mon Mar 26 17:42:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5619 >/dev/null 2>/dev/null selfserv_9280 with PID 5619 found at Mon Mar 26 17:42:27 EDT 2012 selfserv_9280 with PID 5619 started at Mon Mar 26 17:42:27 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:27 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:27 EDT 2012 ssl.sh: #2905: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5619 at Mon Mar 26 17:42:27 EDT 2012 kill -USR1 5619 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5619 killed at Mon Mar 26 17:42:27 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9280 starting at Mon Mar 26 17:42:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5695 >/dev/null 2>/dev/null selfserv_9280 with PID 5695 found at Mon Mar 26 17:42:27 EDT 2012 selfserv_9280 with PID 5695 started at Mon Mar 26 17:42:27 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:27 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:28 EDT 2012 ssl.sh: #2906: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5695 at Mon Mar 26 17:42:28 EDT 2012 kill -USR1 5695 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5695 killed at Mon Mar 26 17:42:28 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9280 starting at Mon Mar 26 17:42:28 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5771 >/dev/null 2>/dev/null selfserv_9280 with PID 5771 found at Mon Mar 26 17:42:28 EDT 2012 selfserv_9280 with PID 5771 started at Mon Mar 26 17:42:28 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:28 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:29 EDT 2012 ssl.sh: #2907: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5771 at Mon Mar 26 17:42:29 EDT 2012 kill -USR1 5771 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5771 killed at Mon Mar 26 17:42:29 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9280 starting at Mon Mar 26 17:42:29 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5847 >/dev/null 2>/dev/null selfserv_9280 with PID 5847 found at Mon Mar 26 17:42:29 EDT 2012 selfserv_9280 with PID 5847 started at Mon Mar 26 17:42:29 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:29 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:42:29 EDT 2012 ssl.sh: #2908: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5847 at Mon Mar 26 17:42:29 EDT 2012 kill -USR1 5847 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5847 killed at Mon Mar 26 17:42:29 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:29 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5952 >/dev/null 2>/dev/null selfserv_9280 with PID 5952 found at Mon Mar 26 17:42:29 EDT 2012 selfserv_9280 with PID 5952 started at Mon Mar 26 17:42:29 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:29 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:42:30 EDT 2012 ssl.sh: #2909: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5952 at Mon Mar 26 17:42:30 EDT 2012 kill -USR1 5952 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5952 killed at Mon Mar 26 17:42:30 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6027 >/dev/null 2>/dev/null selfserv_9280 with PID 6027 found at Mon Mar 26 17:42:30 EDT 2012 selfserv_9280 with PID 6027 started at Mon Mar 26 17:42:30 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:30 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:42:31 EDT 2012 ssl.sh: #2910: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6027 at Mon Mar 26 17:42:31 EDT 2012 kill -USR1 6027 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6027 killed at Mon Mar 26 17:42:31 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:31 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6102 >/dev/null 2>/dev/null selfserv_9280 with PID 6102 found at Mon Mar 26 17:42:31 EDT 2012 selfserv_9280 with PID 6102 started at Mon Mar 26 17:42:31 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:31 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:42:31 EDT 2012 ssl.sh: #2911: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6102 at Mon Mar 26 17:42:31 EDT 2012 kill -USR1 6102 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6102 killed at Mon Mar 26 17:42:31 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:31 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6178 >/dev/null 2>/dev/null selfserv_9280 with PID 6178 found at Mon Mar 26 17:42:31 EDT 2012 selfserv_9280 with PID 6178 started at Mon Mar 26 17:42:31 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:31 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:31 EDT 2012 ssl.sh: #2912: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6178 at Mon Mar 26 17:42:32 EDT 2012 kill -USR1 6178 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6178 killed at Mon Mar 26 17:42:32 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:42:32 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6254 >/dev/null 2>/dev/null selfserv_9280 with PID 6254 found at Mon Mar 26 17:42:32 EDT 2012 selfserv_9280 with PID 6254 started at Mon Mar 26 17:42:32 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:32 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:42:32 EDT 2012 ssl.sh: #2913: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6254 at Mon Mar 26 17:42:32 EDT 2012 kill -USR1 6254 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6254 killed at Mon Mar 26 17:42:32 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:42:32 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6330 >/dev/null 2>/dev/null selfserv_9280 with PID 6330 found at Mon Mar 26 17:42:32 EDT 2012 selfserv_9280 with PID 6330 started at Mon Mar 26 17:42:32 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:32 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:42:32 EDT 2012 ssl.sh: #2914: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6330 at Mon Mar 26 17:42:32 EDT 2012 kill -USR1 6330 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6330 killed at Mon Mar 26 17:42:32 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:42:32 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:42:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6406 >/dev/null 2>/dev/null selfserv_9280 with PID 6406 found at Mon Mar 26 17:42:32 EDT 2012 selfserv_9280 with PID 6406 started at Mon Mar 26 17:42:32 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:42:32 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:42:32 EDT 2012 ssl.sh: #2915: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6406 at Mon Mar 26 17:42:32 EDT 2012 kill -USR1 6406 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6406 killed at Mon Mar 26 17:42:32 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) TIMESTAMP ssl END: Mon Mar 26 17:42:33 EDT 2012 Running tests for ocsp TIMESTAMP ocsp BEGIN: Mon Mar 26 17:42:33 EDT 2012 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Mon Mar 26 17:42:33 EDT 2012 Running tests for pkits TIMESTAMP pkits BEGIN: Mon Mar 26 17:42:33 EDT 2012 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Mon Mar 26 17:42:33 EDT 2012 Running tests for chains TIMESTAMP chains BEGIN: Mon Mar 26 17:42:33 EDT 2012 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #2916: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174234 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2917: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #2918: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #2919: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174235 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2920: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #2921: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #2922: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2923: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326174236 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2924: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #2925: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326174237 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2926: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #2927: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #2928: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2929: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2930: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 326174238 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2931: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der chains.sh: #2932: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2933: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #2934: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #2935: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174235 (0x1371061b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:42:33 2012 Not After : Sun Mar 26 21:42:33 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:54:8f:87:6f:4e:1b:b9:30:bc:65:1b:7e:6c:ac:4e: b7:67:3e:97:3e:2d:a2:b8:8e:a8:f7:55:fb:d1:59:ff: d4:57:ad:12:65:8f:64:a5:68:af:bf:8c:1f:b4:e9:0a: c2:60:3c:c6:8b:b5:d9:70:bd:0a:74:3f:91:09:31:a4: b6:0c:d6:32:0d:a2:b4:27:90:fc:3b:a0:a8:53:8d:a5: 9d:90:ce:17:b5:70:6e:56:e8:1a:c6:95:13:ec:2a:5a: 63:38:c2:af:90:92:45:bd:d2:9c:58:3d:bc:e0:04:32: 6a:0a:07:40:18:79:0f:d7:92:9e:23:62:7c:df:7c:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:36:95:d1:d3:e4:7f:34:68:f7:8b:ee:78:ac:c1:ab: 89:cf:e2:8d:24:9a:1e:4a:22:5c:22:9b:59:d9:e2:f0: ca:f5:f8:5b:0f:bd:28:29:51:bc:41:ab:76:8e:af:6c: aa:d2:b9:4e:0c:c8:cc:01:96:f3:93:54:90:d2:4e:2a: ac:55:3e:4f:da:25:82:52:d8:64:3e:72:36:62:ea:fa: e7:92:3a:fc:05:e8:0e:bc:e6:0c:47:4b:2e:38:a4:d0: 06:0a:c9:d3:1c:e2:81:91:92:06:70:e8:1c:aa:c4:87: 0a:3f:6f:58:16:c1:12:2f:6e:a4:35:e3:f2:a2:bb:d3 Fingerprint (MD5): 32:E6:3F:93:D8:7D:AC:62:DD:E6:7D:D5:7F:21:62:D0 Fingerprint (SHA1): 1B:4D:2D:6D:0B:62:BB:A6:E7:82:F8:63:79:7D:65:E6:89:D0:21:27 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2936: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174234 (0x1371061a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:42:33 2012 Not After : Sun Mar 26 21:42:33 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:65:c7:cd:70:0b:b1:f7:22:9f:ce:45:a2:49:4d:11: 2b:52:8e:ab:ad:af:b5:2a:cd:65:39:2e:d9:73:f7:07: 0f:7c:6a:91:d1:cb:6f:7a:c2:85:47:c3:98:70:ef:48: 77:3f:e3:72:06:63:d7:d5:93:f0:ea:16:0d:79:5d:81: 24:7b:83:97:fd:ac:07:d5:bd:f8:88:0d:8a:e4:4c:2c: a2:4e:f5:eb:02:43:63:d0:5a:09:07:b1:90:37:c7:19: d4:32:92:3a:22:db:ec:dc:38:aa:98:d5:4c:af:a9:68: 62:7a:5c:be:d5:c7:e5:8d:47:38:be:c8:11:c5:47:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 43:9c:fc:5a:3a:e1:d4:e4:8e:11:bf:1d:84:66:d7:69: d9:c0:0c:15:b5:23:73:66:72:08:62:45:2b:2b:79:9e: 66:6f:8b:df:25:68:40:0a:4c:cb:5c:d7:9f:3c:ef:ec: 6d:81:6a:15:92:4f:30:ff:f9:db:14:cc:5d:85:62:8c: 16:7a:55:6c:d6:73:58:72:b6:c4:59:30:c8:8a:90:bd: 10:30:b8:f8:40:13:8a:63:89:66:fb:0a:e4:2f:5e:74: 87:51:6d:99:36:dc:13:89:03:f7:8d:17:3b:47:98:74: e7:a5:3d:ab:de:fb:b2:79:d0:5b:8d:fa:ac:fc:81:dc Fingerprint (MD5): B8:75:5E:C8:D9:23:61:14:78:4A:BE:9A:1E:14:87:18 Fingerprint (SHA1): 1F:2B:D9:A4:70:7D:67:F7:90:C5:34:D8:E1:FA:8D:91:95:67:B3:16 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2937: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2938: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #2939: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #2940: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174234 (0x1371061a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:42:33 2012 Not After : Sun Mar 26 21:42:33 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:65:c7:cd:70:0b:b1:f7:22:9f:ce:45:a2:49:4d:11: 2b:52:8e:ab:ad:af:b5:2a:cd:65:39:2e:d9:73:f7:07: 0f:7c:6a:91:d1:cb:6f:7a:c2:85:47:c3:98:70:ef:48: 77:3f:e3:72:06:63:d7:d5:93:f0:ea:16:0d:79:5d:81: 24:7b:83:97:fd:ac:07:d5:bd:f8:88:0d:8a:e4:4c:2c: a2:4e:f5:eb:02:43:63:d0:5a:09:07:b1:90:37:c7:19: d4:32:92:3a:22:db:ec:dc:38:aa:98:d5:4c:af:a9:68: 62:7a:5c:be:d5:c7:e5:8d:47:38:be:c8:11:c5:47:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 43:9c:fc:5a:3a:e1:d4:e4:8e:11:bf:1d:84:66:d7:69: d9:c0:0c:15:b5:23:73:66:72:08:62:45:2b:2b:79:9e: 66:6f:8b:df:25:68:40:0a:4c:cb:5c:d7:9f:3c:ef:ec: 6d:81:6a:15:92:4f:30:ff:f9:db:14:cc:5d:85:62:8c: 16:7a:55:6c:d6:73:58:72:b6:c4:59:30:c8:8a:90:bd: 10:30:b8:f8:40:13:8a:63:89:66:fb:0a:e4:2f:5e:74: 87:51:6d:99:36:dc:13:89:03:f7:8d:17:3b:47:98:74: e7:a5:3d:ab:de:fb:b2:79:d0:5b:8d:fa:ac:fc:81:dc Fingerprint (MD5): B8:75:5E:C8:D9:23:61:14:78:4A:BE:9A:1E:14:87:18 Fingerprint (SHA1): 1F:2B:D9:A4:70:7D:67:F7:90:C5:34:D8:E1:FA:8D:91:95:67:B3:16 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2941: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174235 (0x1371061b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:42:33 2012 Not After : Sun Mar 26 21:42:33 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:54:8f:87:6f:4e:1b:b9:30:bc:65:1b:7e:6c:ac:4e: b7:67:3e:97:3e:2d:a2:b8:8e:a8:f7:55:fb:d1:59:ff: d4:57:ad:12:65:8f:64:a5:68:af:bf:8c:1f:b4:e9:0a: c2:60:3c:c6:8b:b5:d9:70:bd:0a:74:3f:91:09:31:a4: b6:0c:d6:32:0d:a2:b4:27:90:fc:3b:a0:a8:53:8d:a5: 9d:90:ce:17:b5:70:6e:56:e8:1a:c6:95:13:ec:2a:5a: 63:38:c2:af:90:92:45:bd:d2:9c:58:3d:bc:e0:04:32: 6a:0a:07:40:18:79:0f:d7:92:9e:23:62:7c:df:7c:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:36:95:d1:d3:e4:7f:34:68:f7:8b:ee:78:ac:c1:ab: 89:cf:e2:8d:24:9a:1e:4a:22:5c:22:9b:59:d9:e2:f0: ca:f5:f8:5b:0f:bd:28:29:51:bc:41:ab:76:8e:af:6c: aa:d2:b9:4e:0c:c8:cc:01:96:f3:93:54:90:d2:4e:2a: ac:55:3e:4f:da:25:82:52:d8:64:3e:72:36:62:ea:fa: e7:92:3a:fc:05:e8:0e:bc:e6:0c:47:4b:2e:38:a4:d0: 06:0a:c9:d3:1c:e2:81:91:92:06:70:e8:1c:aa:c4:87: 0a:3f:6f:58:16:c1:12:2f:6e:a4:35:e3:f2:a2:bb:d3 Fingerprint (MD5): 32:E6:3F:93:D8:7D:AC:62:DD:E6:7D:D5:7F:21:62:D0 Fingerprint (SHA1): 1B:4D:2D:6D:0B:62:BB:A6:E7:82:F8:63:79:7D:65:E6:89:D0:21:27 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2942: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #2943: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #2944: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2945: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2946: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2947: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174235 (0x1371061b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:42:33 2012 Not After : Sun Mar 26 21:42:33 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:54:8f:87:6f:4e:1b:b9:30:bc:65:1b:7e:6c:ac:4e: b7:67:3e:97:3e:2d:a2:b8:8e:a8:f7:55:fb:d1:59:ff: d4:57:ad:12:65:8f:64:a5:68:af:bf:8c:1f:b4:e9:0a: c2:60:3c:c6:8b:b5:d9:70:bd:0a:74:3f:91:09:31:a4: b6:0c:d6:32:0d:a2:b4:27:90:fc:3b:a0:a8:53:8d:a5: 9d:90:ce:17:b5:70:6e:56:e8:1a:c6:95:13:ec:2a:5a: 63:38:c2:af:90:92:45:bd:d2:9c:58:3d:bc:e0:04:32: 6a:0a:07:40:18:79:0f:d7:92:9e:23:62:7c:df:7c:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:36:95:d1:d3:e4:7f:34:68:f7:8b:ee:78:ac:c1:ab: 89:cf:e2:8d:24:9a:1e:4a:22:5c:22:9b:59:d9:e2:f0: ca:f5:f8:5b:0f:bd:28:29:51:bc:41:ab:76:8e:af:6c: aa:d2:b9:4e:0c:c8:cc:01:96:f3:93:54:90:d2:4e:2a: ac:55:3e:4f:da:25:82:52:d8:64:3e:72:36:62:ea:fa: e7:92:3a:fc:05:e8:0e:bc:e6:0c:47:4b:2e:38:a4:d0: 06:0a:c9:d3:1c:e2:81:91:92:06:70:e8:1c:aa:c4:87: 0a:3f:6f:58:16:c1:12:2f:6e:a4:35:e3:f2:a2:bb:d3 Fingerprint (MD5): 32:E6:3F:93:D8:7D:AC:62:DD:E6:7D:D5:7F:21:62:D0 Fingerprint (SHA1): 1B:4D:2D:6D:0B:62:BB:A6:E7:82:F8:63:79:7D:65:E6:89:D0:21:27 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2948: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174235 (0x1371061b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:42:33 2012 Not After : Sun Mar 26 21:42:33 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:54:8f:87:6f:4e:1b:b9:30:bc:65:1b:7e:6c:ac:4e: b7:67:3e:97:3e:2d:a2:b8:8e:a8:f7:55:fb:d1:59:ff: d4:57:ad:12:65:8f:64:a5:68:af:bf:8c:1f:b4:e9:0a: c2:60:3c:c6:8b:b5:d9:70:bd:0a:74:3f:91:09:31:a4: b6:0c:d6:32:0d:a2:b4:27:90:fc:3b:a0:a8:53:8d:a5: 9d:90:ce:17:b5:70:6e:56:e8:1a:c6:95:13:ec:2a:5a: 63:38:c2:af:90:92:45:bd:d2:9c:58:3d:bc:e0:04:32: 6a:0a:07:40:18:79:0f:d7:92:9e:23:62:7c:df:7c:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:36:95:d1:d3:e4:7f:34:68:f7:8b:ee:78:ac:c1:ab: 89:cf:e2:8d:24:9a:1e:4a:22:5c:22:9b:59:d9:e2:f0: ca:f5:f8:5b:0f:bd:28:29:51:bc:41:ab:76:8e:af:6c: aa:d2:b9:4e:0c:c8:cc:01:96:f3:93:54:90:d2:4e:2a: ac:55:3e:4f:da:25:82:52:d8:64:3e:72:36:62:ea:fa: e7:92:3a:fc:05:e8:0e:bc:e6:0c:47:4b:2e:38:a4:d0: 06:0a:c9:d3:1c:e2:81:91:92:06:70:e8:1c:aa:c4:87: 0a:3f:6f:58:16:c1:12:2f:6e:a4:35:e3:f2:a2:bb:d3 Fingerprint (MD5): 32:E6:3F:93:D8:7D:AC:62:DD:E6:7D:D5:7F:21:62:D0 Fingerprint (SHA1): 1B:4D:2D:6D:0B:62:BB:A6:E7:82:F8:63:79:7D:65:E6:89:D0:21:27 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2949: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #2950: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #2951: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2952: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #2953: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #2954: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174234 (0x1371061a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:42:33 2012 Not After : Sun Mar 26 21:42:33 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:65:c7:cd:70:0b:b1:f7:22:9f:ce:45:a2:49:4d:11: 2b:52:8e:ab:ad:af:b5:2a:cd:65:39:2e:d9:73:f7:07: 0f:7c:6a:91:d1:cb:6f:7a:c2:85:47:c3:98:70:ef:48: 77:3f:e3:72:06:63:d7:d5:93:f0:ea:16:0d:79:5d:81: 24:7b:83:97:fd:ac:07:d5:bd:f8:88:0d:8a:e4:4c:2c: a2:4e:f5:eb:02:43:63:d0:5a:09:07:b1:90:37:c7:19: d4:32:92:3a:22:db:ec:dc:38:aa:98:d5:4c:af:a9:68: 62:7a:5c:be:d5:c7:e5:8d:47:38:be:c8:11:c5:47:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 43:9c:fc:5a:3a:e1:d4:e4:8e:11:bf:1d:84:66:d7:69: d9:c0:0c:15:b5:23:73:66:72:08:62:45:2b:2b:79:9e: 66:6f:8b:df:25:68:40:0a:4c:cb:5c:d7:9f:3c:ef:ec: 6d:81:6a:15:92:4f:30:ff:f9:db:14:cc:5d:85:62:8c: 16:7a:55:6c:d6:73:58:72:b6:c4:59:30:c8:8a:90:bd: 10:30:b8:f8:40:13:8a:63:89:66:fb:0a:e4:2f:5e:74: 87:51:6d:99:36:dc:13:89:03:f7:8d:17:3b:47:98:74: e7:a5:3d:ab:de:fb:b2:79:d0:5b:8d:fa:ac:fc:81:dc Fingerprint (MD5): B8:75:5E:C8:D9:23:61:14:78:4A:BE:9A:1E:14:87:18 Fingerprint (SHA1): 1F:2B:D9:A4:70:7D:67:F7:90:C5:34:D8:E1:FA:8D:91:95:67:B3:16 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2955: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174234 (0x1371061a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:42:33 2012 Not After : Sun Mar 26 21:42:33 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:65:c7:cd:70:0b:b1:f7:22:9f:ce:45:a2:49:4d:11: 2b:52:8e:ab:ad:af:b5:2a:cd:65:39:2e:d9:73:f7:07: 0f:7c:6a:91:d1:cb:6f:7a:c2:85:47:c3:98:70:ef:48: 77:3f:e3:72:06:63:d7:d5:93:f0:ea:16:0d:79:5d:81: 24:7b:83:97:fd:ac:07:d5:bd:f8:88:0d:8a:e4:4c:2c: a2:4e:f5:eb:02:43:63:d0:5a:09:07:b1:90:37:c7:19: d4:32:92:3a:22:db:ec:dc:38:aa:98:d5:4c:af:a9:68: 62:7a:5c:be:d5:c7:e5:8d:47:38:be:c8:11:c5:47:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 43:9c:fc:5a:3a:e1:d4:e4:8e:11:bf:1d:84:66:d7:69: d9:c0:0c:15:b5:23:73:66:72:08:62:45:2b:2b:79:9e: 66:6f:8b:df:25:68:40:0a:4c:cb:5c:d7:9f:3c:ef:ec: 6d:81:6a:15:92:4f:30:ff:f9:db:14:cc:5d:85:62:8c: 16:7a:55:6c:d6:73:58:72:b6:c4:59:30:c8:8a:90:bd: 10:30:b8:f8:40:13:8a:63:89:66:fb:0a:e4:2f:5e:74: 87:51:6d:99:36:dc:13:89:03:f7:8d:17:3b:47:98:74: e7:a5:3d:ab:de:fb:b2:79:d0:5b:8d:fa:ac:fc:81:dc Fingerprint (MD5): B8:75:5E:C8:D9:23:61:14:78:4A:BE:9A:1E:14:87:18 Fingerprint (SHA1): 1F:2B:D9:A4:70:7D:67:F7:90:C5:34:D8:E1:FA:8D:91:95:67:B3:16 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2956: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #2957: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174239 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2958: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #2959: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #2960: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174240 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2961: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #2962: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #2963: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174241 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2964: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #2965: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #2966: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174242 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2967: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #2968: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #2969: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174243 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2970: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #2971: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #2972: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174244 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2973: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #2974: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #2975: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174245 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2976: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #2977: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #2978: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174246 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2979: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #2980: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #2981: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174247 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2982: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #2983: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #2984: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2985: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 326174248 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2986: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der chains.sh: #2987: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 326174249 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2988: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der chains.sh: #2989: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 326174250 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2990: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der chains.sh: #2991: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #2992: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #2993: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2994: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 326174251 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2995: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der chains.sh: #2996: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 326174252 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2997: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der chains.sh: #2998: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 326174253 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2999: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der chains.sh: #3000: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #3001: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #3002: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3003: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 326174254 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3004: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der chains.sh: #3005: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 326174255 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3006: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der chains.sh: #3007: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 326174256 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3008: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der chains.sh: #3009: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #3010: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #3011: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3012: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 326174257 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3013: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der chains.sh: #3014: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 326174258 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3015: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der chains.sh: #3016: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 326174259 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3017: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der chains.sh: #3018: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #3019: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3020: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3021: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 326174260 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3022: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der chains.sh: #3023: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3024: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3025: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174261 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3026: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #3027: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174239 (0x1371061f) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Mar 26 21:42:36 2012 Not After : Sun Mar 26 21:42:36 2062 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:d4:f9:9c:8f:ad:5f:db:0c:6b:12:27:0e:b7:92:ba: c2:8e:0c:65:ec:e9:e2:9b:d8:87:84:62:9c:af:ab:c2: 03:bb:04:e8:78:1f:8f:67:58:1d:82:82:ba:af:b3:23: e8:c4:57:dd:cb:82:f9:ac:1a:72:54:af:35:25:a7:71: 9a:7d:b5:06:b0:35:a7:30:67:18:f7:2d:4d:fc:5f:ba: 89:a5:18:bd:60:da:d8:e3:8e:d9:1b:85:4b:db:0d:01: 18:d4:b8:b5:8e:fe:34:fc:d8:7c:04:4a:9a:cf:ae:93: 5a:8f:26:8c:c7:70:69:0e:a2:86:d2:78:cd:0a:81:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 31:b1:27:20:85:92:5c:a4:45:dc:02:a9:09:86:c5:c5: ef:29:88:b2:d0:bb:dd:7c:d6:7b:ba:1a:ce:a6:5c:75: 3f:a2:bd:7d:c4:4c:53:76:75:c2:26:8e:d3:86:bf:c6: 0a:c9:79:18:23:32:ce:0b:09:cd:8d:03:10:81:f5:1f: 53:52:e2:73:3c:a1:62:74:9d:94:a8:4f:38:28:cb:c0: f5:ad:2d:bd:23:ab:5b:25:eb:1b:c8:62:e6:fb:a1:6c: 12:d0:67:dc:f0:ae:c3:da:6e:6b:ca:64:b8:b6:0f:af: 37:84:d7:51:f8:f8:d0:5c:e1:3b:56:5a:87:52:3d:dd Fingerprint (MD5): E0:EA:D2:4A:65:72:FE:88:32:FE:B5:F6:2A:C5:C0:0F Fingerprint (SHA1): BF:76:1D:47:F7:05:D5:14:76:0E:85:8D:C3:0E:5F:45:63:7C:BB:94 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3028: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174240 (0x13710620) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Mar 26 21:42:36 2012 Not After : Sun Mar 26 21:42:36 2062 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:e4:8c:b5:1e:c4:b5:2d:16:d0:93:a5:97:29:ae:d8: d0:05:34:ec:eb:fd:17:d3:78:f9:0b:9f:05:54:f2:ca: db:ad:c3:26:b3:a6:21:bd:82:31:b1:75:ee:de:b8:43: d8:25:52:d8:b0:c4:f2:40:d8:9e:8c:46:f5:bf:23:33: 3e:4f:51:ce:2e:f9:c2:a7:7a:ea:b9:1d:15:db:e3:cd: f7:02:9d:04:11:22:52:41:f1:dc:6d:6a:a1:60:47:fb: 6a:5b:bf:3d:b5:a4:d8:92:c9:cb:76:99:31:cf:c8:98: ba:d9:09:d2:55:31:fb:0c:74:32:f4:c9:09:d0:81:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 09:43:fc:20:c0:98:0e:49:52:89:79:45:a8:b8:1e:61: 92:e3:2f:8c:1d:2a:64:02:8f:4c:ce:82:a8:75:7d:82: 5d:b1:55:7c:7e:11:c8:79:68:88:31:67:ab:4b:1b:f3: b6:71:d9:b8:10:f3:1c:34:82:c5:96:8f:ea:dd:42:34: 2c:df:f8:79:15:5d:84:00:8b:c6:bd:10:92:0d:35:e3: 3b:d7:41:ff:9b:63:d3:c8:a9:7a:3d:38:c9:2f:0d:0c: ad:3b:c0:33:1e:35:73:d6:b9:4b:a1:cc:8e:bc:55:3c: 80:b0:86:a1:e9:8e:54:d3:be:0b:22:b6:4e:69:4d:55 Fingerprint (MD5): E6:2E:98:B8:E6:71:06:86:48:C9:13:89:EC:4C:94:0C Fingerprint (SHA1): C9:2B:54:66:A3:38:8B:4E:51:A9:28:62:E4:69:67:03:81:47:93:76 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3029: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174241 (0x13710621) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Mar 26 21:42:36 2012 Not After : Sun Mar 26 21:42:36 2062 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:18:b7:ee:3d:1e:13:57:6c:49:eb:00:85:e8:d3:35: 44:f5:77:c8:d6:b8:7b:9f:57:79:3a:55:7f:e3:0d:99: 92:a8:37:36:f6:d2:cb:76:57:8c:4e:7a:39:05:e1:b3: 77:b6:a9:57:f3:78:bc:56:cc:cc:df:a9:07:11:1c:48: 3a:dd:64:5f:91:48:9f:14:78:74:26:d1:89:8e:a0:13: 3d:f6:d2:9e:32:d8:e6:ca:b0:f1:d8:9e:6c:f4:1a:d4: 39:81:59:97:5f:0f:6e:f6:f8:0b:cf:6c:9f:55:ae:9d: 78:30:e9:c6:28:50:12:3d:e7:f1:7a:1a:1d:67:69:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ad:e7:73:b7:26:20:b9:07:52:57:f1:11:08:46:ca:7b: 9f:bc:f4:e0:be:fa:ff:fe:b0:4a:ce:de:fd:05:f5:aa: c2:1c:11:dc:61:75:8e:91:5b:67:fb:a4:ca:24:25:f2: 96:aa:7e:bd:62:c0:12:bc:7f:1f:0a:db:77:06:da:5d: d1:c5:93:76:0e:12:09:a2:94:02:24:f0:c8:51:b2:88: 83:14:16:1d:a9:3d:38:0d:8f:fe:67:55:07:ee:17:81: a0:f0:55:0f:c8:8b:26:c2:5a:b4:d3:7a:9a:91:3e:08: 95:1c:b8:c8:f4:a3:5d:49:05:ea:c0:16:77:16:b8:78 Fingerprint (MD5): 84:05:CD:72:7A:90:50:CA:C8:C9:79:CD:16:EE:54:C1 Fingerprint (SHA1): 96:60:D6:D3:1F:EF:1A:7A:07:38:4E:D9:81:14:64:CB:F7:7E:CF:13 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3030: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174242 (0x13710622) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Mar 26 21:42:36 2012 Not After : Sun Mar 26 21:42:36 2062 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:3a:0a:af:53:d0:9f:94:5a:7e:12:12:5d:f8:2b:26: 99:c6:74:52:fe:9f:a3:e6:9b:f2:22:b1:d9:0c:79:31: 19:db:78:02:ae:57:d9:f5:ab:f2:d0:79:76:b3:07:ad: 50:b6:d2:31:cc:65:dc:84:b1:0c:3f:51:5a:34:03:3a: 3d:c2:3f:a2:fa:d8:76:f1:b8:fd:29:f9:8e:d4:f0:72: ec:cc:4e:f8:12:b1:72:25:1b:20:62:03:f4:65:ac:b5: b8:5c:69:3f:f2:2c:49:05:71:43:e4:ae:8d:6b:51:fc: 36:ba:b6:92:db:70:8c:b5:3a:98:c6:e4:4e:db:f2:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 56:a3:e2:d1:d2:27:6f:9d:29:5f:26:f1:6a:72:94:7f: b3:a0:67:78:c5:71:15:a9:42:ca:ee:ca:21:b5:d1:a4: e0:14:f8:10:01:80:0b:54:39:0a:02:33:79:06:09:13: 91:36:b2:7b:b4:79:a7:63:ec:da:09:fa:29:81:8a:c6: 33:64:d5:e9:9e:37:8c:28:74:90:c3:d9:72:fb:77:41: 3a:3a:38:16:93:65:ee:50:63:ac:ce:f3:65:a8:70:72: a6:c5:c1:7e:f7:4b:89:b0:d7:a8:6f:f2:24:c9:6b:07: 58:a5:fb:6e:db:79:a5:80:07:db:37:1d:e4:d8:09:21 Fingerprint (MD5): 28:A2:CE:41:C5:D9:FE:D8:D0:F1:7E:27:D1:EA:10:B8 Fingerprint (SHA1): 42:D0:B2:64:DD:88:C5:9A:85:A6:CE:28:B5:5C:DE:C5:47:10:73:E8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3031: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174243 (0x13710623) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Mar 26 21:42:37 2012 Not After : Sun Mar 26 21:42:37 2062 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:85:e7:22:d0:ee:b4:62:13:00:ae:24:09:b0:c3:4e: 41:ea:ea:f1:fe:9c:8e:bf:34:b3:7f:7a:93:23:ab:a4: 9f:de:a5:d2:7f:f6:fe:b9:30:ad:00:6f:7f:5e:3b:50: 66:19:7f:e3:1d:bb:b0:2b:86:d4:66:b9:34:9a:b0:61: 66:10:0b:20:85:06:f0:41:47:6f:58:9f:99:f9:ef:08: 05:4a:7b:79:33:d0:06:2b:e0:3a:89:62:fa:c3:11:35: dc:46:29:33:c5:f0:99:6b:c5:dd:dd:b9:c5:4e:75:ac: a5:c9:2c:df:b6:82:ac:29:72:b9:5f:1c:5d:03:a8:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 59:f1:ea:19:db:f9:f7:e7:3c:1f:7c:60:42:eb:1c:c8: df:06:1c:20:5b:f9:8c:6d:ef:0e:d9:9b:bb:36:f7:58: 57:ab:8f:75:4f:81:40:47:b8:74:60:03:ef:42:db:1a: 01:94:42:7c:f9:ec:0c:db:4f:ec:97:5c:f9:6d:df:1b: a6:8d:ca:27:82:08:a6:75:00:e1:eb:23:d7:27:1c:af: ed:44:a5:50:19:80:3a:9d:ef:d0:89:8d:d8:16:5b:fb: fe:d3:24:64:dc:40:dd:4a:fe:83:e9:ff:7f:7a:80:97: ee:70:41:c5:c6:56:a5:8f:65:f0:5a:8c:ed:47:a8:2a Fingerprint (MD5): 33:D4:C6:80:DE:5B:05:AF:E1:DC:8B:62:0C:82:6A:8E Fingerprint (SHA1): 4C:A7:87:13:D7:B6:6D:79:02:F2:DE:94:09:74:66:86:D9:1D:18:5E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3032: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174244 (0x13710624) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Mar 26 21:42:37 2012 Not After : Sun Mar 26 21:42:37 2062 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:70:70:fd:4b:14:c2:cd:9c:b1:eb:af:02:c5:87:91: cf:11:8e:62:ac:5a:49:58:2e:5c:b0:c9:9c:d5:3e:5c: 51:f9:cd:a6:80:ee:31:12:60:8a:4f:13:07:21:c5:54: 25:85:d9:9d:d0:db:a0:3d:94:d4:54:21:29:b4:39:9a: af:66:86:97:b5:9d:95:72:16:1f:c2:0e:26:0d:28:6e: 6d:43:36:91:f6:0a:ce:74:5f:69:18:e1:17:a8:b9:9e: 87:54:76:59:4d:38:88:d0:bd:64:eb:c4:f5:32:2c:76: d5:bd:ce:fc:a7:d4:11:68:20:4a:a9:86:af:19:41:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 81:72:44:8d:90:09:1c:39:2e:1f:66:d0:5f:c4:ee:a3: 88:05:77:f8:bb:b5:a9:ae:14:ca:a2:6f:a3:8b:68:20: be:e7:9a:7b:e6:72:1c:19:1c:d7:40:e3:a0:27:1b:ed: 9c:46:c6:37:e8:e4:79:13:73:d9:15:cf:1c:8e:7f:d7: 87:eb:7e:39:27:27:89:cb:4c:7e:59:57:22:34:5f:70: 59:1a:f3:9c:0c:fc:76:c0:e6:ce:a9:9e:24:07:22:96: bd:25:cc:65:42:b8:b8:6c:67:ef:66:6b:64:51:07:38: 7c:08:89:7f:47:05:a2:d5:d6:1c:74:41:93:44:85:25 Fingerprint (MD5): 79:53:70:53:14:3D:AF:F7:03:C5:06:55:61:F4:F3:61 Fingerprint (SHA1): AD:1D:A0:D9:78:20:6D:CA:B6:39:A9:13:87:EA:41:45:95:C2:E8:AE Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3033: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174245 (0x13710625) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Mar 26 21:42:38 2012 Not After : Sun Mar 26 21:42:38 2062 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:0f:7c:23:64:71:b6:73:8d:8e:cf:78:1d:2a:ed:6e: e1:67:42:0f:27:4b:cf:48:9f:38:52:3e:e4:a2:a5:79: 74:2b:73:ee:c4:38:36:2d:c1:bc:bd:57:0c:7f:33:92: 1e:53:cf:35:64:fb:93:42:cb:36:75:62:5e:ee:9f:25: a0:29:13:10:dd:11:2e:84:5c:9b:a5:d0:87:18:0b:10: ea:25:e3:d4:f8:03:25:44:3c:47:ae:91:36:9e:d5:8e: 2c:ea:23:27:90:bf:ad:89:cf:83:3f:4d:15:d5:f5:d0: 15:64:d1:cb:84:dd:fd:c9:7c:45:37:08:87:ba:ec:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 4d:4b:8b:eb:27:21:a9:fe:92:b5:d7:62:2e:78:46:fb: d2:ae:ac:ce:34:89:93:2c:00:41:60:cb:06:30:32:51: 8d:d5:40:2a:f4:f0:12:bb:34:5f:b4:96:b5:fe:ad:30: a0:ca:95:55:b4:a4:22:2f:1d:33:93:bb:6c:f9:56:3f: 8e:47:e7:4c:61:d8:71:58:04:fa:e0:96:60:24:3f:78: bf:9b:97:13:e7:69:c7:e4:ac:00:ce:da:c2:d8:2b:12: d8:d9:8c:a0:84:46:1d:ce:a4:f5:f9:86:62:1a:2e:5f: f2:7a:39:0e:1f:ab:36:c0:ba:ae:88:d0:d9:38:c7:14 Fingerprint (MD5): ED:F7:03:64:EC:89:BA:22:61:50:E8:8B:4F:2B:B9:10 Fingerprint (SHA1): 15:65:74:DC:CE:AE:C1:2E:CD:63:CB:BF:5F:C2:9D:09:66:28:D4:DE Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3034: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174246 (0x13710626) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Mar 26 21:42:38 2012 Not After : Sun Mar 26 21:42:38 2062 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:03:dc:b3:e7:60:cd:d8:6e:95:fb:6e:e5:84:6f:e4: 56:7e:3d:f0:10:a5:8a:d4:89:d4:c0:e8:8f:4f:a5:6a: fa:79:9b:ab:87:26:25:01:f9:39:88:07:bb:c0:bb:52: d8:2c:b8:f1:16:a2:a1:34:31:fb:25:d7:eb:62:0e:6e: e3:3d:1d:ed:a5:a5:26:da:3a:c3:5a:b5:f8:d7:7d:e0: df:58:0c:d6:ef:11:e6:e4:21:71:d9:81:d8:dd:00:14: 1a:0b:02:cb:a7:31:59:8d:91:6c:ee:aa:61:91:34:23: fa:67:38:6e:c4:7b:db:c4:cb:36:01:45:97:73:21:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 92:0e:97:f3:bf:e8:bd:fa:d7:5d:d0:57:e6:7f:5f:65: 2c:ad:66:b7:bc:a5:02:c5:23:f7:ca:09:17:4d:f3:47: 6e:55:ad:34:7a:3a:03:72:98:32:b1:a2:5e:61:08:de: be:4d:a5:d3:e9:5e:46:c7:62:88:0c:86:a4:09:be:12: ea:00:d0:8e:b7:d7:60:a9:85:47:11:ea:1c:af:54:e0: 21:5a:f6:75:3f:0e:c1:cf:3b:e4:24:76:8b:84:ca:24: ea:67:73:95:b9:0a:4d:6a:50:98:e4:fb:ce:b5:b9:4a: 48:1b:9a:db:f6:c5:83:d4:f8:b2:2e:22:c3:99:bd:ce Fingerprint (MD5): 6A:CA:D4:41:76:FA:EB:5C:F5:27:51:9A:B4:E5:A3:B2 Fingerprint (SHA1): 2D:B7:D3:5B:2C:5D:58:66:13:55:CE:F6:E6:02:7E:07:51:86:C3:B2 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3035: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174247 (0x13710627) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Mar 26 21:42:39 2012 Not After : Sun Mar 26 21:42:39 2062 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:37:9f:bd:5e:e7:0c:ef:a6:43:8e:da:4c:55:c9:39: 6a:67:43:36:1a:e2:b3:56:19:1f:5b:2d:f3:c8:30:5a: 2c:a7:29:ad:81:34:2b:9f:26:01:74:9e:56:87:35:84: 67:fb:2b:e3:65:9a:01:4f:c9:03:94:87:91:0e:c6:92: 04:5a:22:46:51:83:e4:de:ad:0d:16:c4:f2:44:91:9a: 37:8e:19:1d:83:95:48:fb:5f:34:87:f0:8a:63:a0:69: 4d:67:0c:9c:49:9e:f6:de:98:cd:42:f4:77:19:91:2d: a4:f0:37:96:74:2e:f6:85:97:8c:ea:4d:33:39:b1:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b7:4a:62:ed:d9:d1:06:36:3c:22:5a:bc:4e:64:10:05: 7d:f3:38:95:16:ad:46:1e:57:90:d0:7a:bf:7f:3d:3f: ef:6d:88:f7:55:42:da:54:f6:ac:71:9a:81:24:be:f4: 02:90:c3:e2:ff:85:ab:b7:e8:39:45:08:a3:5b:84:99: 85:f6:5e:c3:52:4c:47:98:52:a9:5c:d4:b3:3c:32:ce: 63:ac:52:b7:43:52:05:a5:9a:55:0d:dc:5f:f5:34:71: d1:ae:ad:8a:42:75:6c:5a:2c:e6:a4:9f:60:b9:b1:6c: 3e:b6:be:03:92:fd:e5:b2:ed:ac:9e:04:57:91:18:91 Fingerprint (MD5): 10:83:81:21:DF:CC:B4:B3:A8:BA:C7:4E:E6:C8:14:70 Fingerprint (SHA1): 0A:7C:3C:5A:56:0A:25:53:7C:F7:81:1C:51:1E:60:73:B4:77:17:C5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3036: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3037: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174262 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3038: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3039: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3040: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3041: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174263 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3042: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3043: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3044: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3045: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174264 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3046: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3047: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3048: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3049: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326174265 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3050: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #3051: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3052: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174262 (0x13710636) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:42:44 2012 Not After : Sun Mar 26 21:42:44 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:1a:c7:8e:88:8c:c0:42:ff:b1:6e:52:d1:67:58:89: 86:47:8c:d1:be:82:1e:f0:da:1e:b4:59:19:3e:76:ef: f5:e9:a3:10:3c:78:c0:01:2c:a6:c4:77:65:e8:c6:39: 23:6e:01:08:a0:f7:9e:de:0c:5f:95:fc:67:d5:5e:73: cc:79:a6:43:b7:77:f9:4d:b7:54:49:42:35:cb:f7:a4: d6:25:08:da:95:dc:ea:f6:5e:a5:4e:f2:4e:93:ef:66: c9:1e:78:37:aa:9f:25:1b:b8:a7:f0:4f:e9:a6:22:50: a1:5c:62:91:e4:a6:40:b5:0b:92:61:97:02:31:08:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:14:4f:b1:33:07:ea:ef:4f:f7:21:f4:e1:db:90:ee: 5e:93:db:68:7a:84:4e:da:6e:d4:68:ae:3f:fa:9a:9c: e5:30:f1:69:58:ea:20:de:3a:34:d1:03:c7:69:b1:40: f4:be:0e:1b:2c:d9:5f:8f:c2:73:88:16:66:98:00:b6: ec:32:b1:5e:38:5e:57:1d:c8:96:ba:49:23:36:ac:67: 3d:58:bc:71:47:04:5e:12:19:f4:50:2e:36:1d:84:b8: a5:d5:a9:70:f4:0a:13:7e:b7:9e:d7:e2:b7:1c:fe:65: 7f:30:ad:f4:64:86:7c:73:43:37:8b:9e:13:03:28:a7 Fingerprint (MD5): B1:73:33:F5:21:B0:14:82:03:61:A3:95:BB:BE:35:98 Fingerprint (SHA1): 71:1C:A0:A0:F1:7C:82:29:53:92:48:C0:3A:C1:B5:15:AD:4D:53:8A Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3053: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3054: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174263 (0x13710637) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:42:44 2012 Not After : Sun Mar 26 21:42:44 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:34:da:b0:f4:5b:7f:ad:17:89:7c:83:03:0f:80:85: 89:b1:1d:78:8f:c6:81:53:30:de:a3:42:3b:15:af:8f: 54:34:4e:dd:e2:7d:7e:0c:da:94:c0:35:2b:3d:70:60: 65:22:4f:17:ae:9b:21:b7:2a:e6:b4:b9:89:d8:c7:71: 36:78:3c:55:b8:ac:64:aa:ff:b0:59:06:78:e2:02:f3: 85:04:49:08:a5:86:ef:c3:9a:fc:03:d1:e8:38:7f:49: 9f:5d:f5:36:02:e4:8d:74:4a:b6:53:de:d4:40:3e:a1: 3a:a9:cc:89:25:d1:ca:70:8b:d9:fb:2e:15:ac:b7:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ae:4f:71:c4:0a:c1:17:ec:cc:b8:0b:78:aa:d5:25:fc: e6:aa:3e:88:6e:ca:c9:10:87:3e:e7:e6:d5:45:fd:26: a0:8b:7d:83:0a:ad:14:2f:dd:c0:eb:ee:28:49:d5:d6: 6b:db:24:c7:e4:35:fd:1b:6d:43:cb:18:4e:4c:52:5e: 7e:63:00:97:37:b8:20:ac:8c:5d:d0:7b:53:e4:f3:f5: bd:1f:de:52:6b:cd:ca:06:87:db:7e:ef:8f:28:21:3f: 1d:55:fa:77:50:d7:a2:c5:c8:cd:17:7e:66:ed:c2:29: f7:a7:4f:78:03:50:90:e8:61:fe:fd:8b:4e:9b:91:0d Fingerprint (MD5): C5:29:A0:F4:89:27:72:AE:3E:D7:6B:36:E5:EA:DC:AC Fingerprint (SHA1): F1:4C:F7:1E:32:5C:73:A2:97:B8:FB:BA:7F:A4:33:FB:96:ED:8D:D9 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3055: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3056: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174264 (0x13710638) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:42:44 2012 Not After : Sun Mar 26 21:42:44 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:8d:5d:70:57:84:91:18:a5:d6:f5:aa:67:84:9c:de: 61:14:7e:98:2e:43:51:7e:9c:63:1c:04:23:c8:45:64: 31:14:3c:3a:f2:4e:66:cf:72:d8:1d:a3:2e:aa:2b:1c: aa:3a:36:13:34:eb:4b:9d:ab:8f:82:a7:cf:a3:5a:79: 58:fc:18:86:78:df:b5:1f:22:e4:5f:d7:65:e4:7b:51: 38:74:12:ab:22:be:2e:b9:e3:4a:bd:b0:34:b7:7f:a0: 08:1a:82:20:bd:c3:95:21:cc:fd:e6:a3:cd:b8:4e:f2: 04:f8:cd:c8:db:5d:d6:d8:67:bd:db:c9:53:61:c6:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 5a:bc:b6:5d:36:bb:78:1a:ea:c1:cd:d9:dc:52:7b:9e: bb:d0:42:7b:c5:43:7b:88:81:0d:18:89:d4:fc:c9:62: e5:0f:11:c3:5b:13:21:0d:83:52:42:52:5f:6a:a4:09: ce:df:97:b6:c4:fc:ae:40:79:fa:98:3a:fd:de:18:49: c2:f7:0b:7f:33:09:89:46:1e:3c:9e:e2:ef:41:3b:22: 77:85:2f:99:ee:59:8e:70:3d:bb:05:ea:38:88:9a:d9: bb:3e:b6:31:2a:c6:07:4e:ff:19:fc:bf:dd:e7:b3:2f: b5:fa:d9:6b:2f:20:07:aa:fa:2a:7b:8a:51:b8:7f:6f Fingerprint (MD5): 46:C6:0B:ED:40:C6:F6:F2:8E:26:53:41:5C:EB:F9:84 Fingerprint (SHA1): BD:35:28:0C:DA:B8:7B:06:D9:8F:8E:DB:9C:AF:84:1F:65:06:05:AE Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3057: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3058: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3059: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3060: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3061: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174262 (0x13710636) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:42:44 2012 Not After : Sun Mar 26 21:42:44 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:1a:c7:8e:88:8c:c0:42:ff:b1:6e:52:d1:67:58:89: 86:47:8c:d1:be:82:1e:f0:da:1e:b4:59:19:3e:76:ef: f5:e9:a3:10:3c:78:c0:01:2c:a6:c4:77:65:e8:c6:39: 23:6e:01:08:a0:f7:9e:de:0c:5f:95:fc:67:d5:5e:73: cc:79:a6:43:b7:77:f9:4d:b7:54:49:42:35:cb:f7:a4: d6:25:08:da:95:dc:ea:f6:5e:a5:4e:f2:4e:93:ef:66: c9:1e:78:37:aa:9f:25:1b:b8:a7:f0:4f:e9:a6:22:50: a1:5c:62:91:e4:a6:40:b5:0b:92:61:97:02:31:08:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:14:4f:b1:33:07:ea:ef:4f:f7:21:f4:e1:db:90:ee: 5e:93:db:68:7a:84:4e:da:6e:d4:68:ae:3f:fa:9a:9c: e5:30:f1:69:58:ea:20:de:3a:34:d1:03:c7:69:b1:40: f4:be:0e:1b:2c:d9:5f:8f:c2:73:88:16:66:98:00:b6: ec:32:b1:5e:38:5e:57:1d:c8:96:ba:49:23:36:ac:67: 3d:58:bc:71:47:04:5e:12:19:f4:50:2e:36:1d:84:b8: a5:d5:a9:70:f4:0a:13:7e:b7:9e:d7:e2:b7:1c:fe:65: 7f:30:ad:f4:64:86:7c:73:43:37:8b:9e:13:03:28:a7 Fingerprint (MD5): B1:73:33:F5:21:B0:14:82:03:61:A3:95:BB:BE:35:98 Fingerprint (SHA1): 71:1C:A0:A0:F1:7C:82:29:53:92:48:C0:3A:C1:B5:15:AD:4D:53:8A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3062: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3063: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174263 (0x13710637) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:42:44 2012 Not After : Sun Mar 26 21:42:44 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:34:da:b0:f4:5b:7f:ad:17:89:7c:83:03:0f:80:85: 89:b1:1d:78:8f:c6:81:53:30:de:a3:42:3b:15:af:8f: 54:34:4e:dd:e2:7d:7e:0c:da:94:c0:35:2b:3d:70:60: 65:22:4f:17:ae:9b:21:b7:2a:e6:b4:b9:89:d8:c7:71: 36:78:3c:55:b8:ac:64:aa:ff:b0:59:06:78:e2:02:f3: 85:04:49:08:a5:86:ef:c3:9a:fc:03:d1:e8:38:7f:49: 9f:5d:f5:36:02:e4:8d:74:4a:b6:53:de:d4:40:3e:a1: 3a:a9:cc:89:25:d1:ca:70:8b:d9:fb:2e:15:ac:b7:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ae:4f:71:c4:0a:c1:17:ec:cc:b8:0b:78:aa:d5:25:fc: e6:aa:3e:88:6e:ca:c9:10:87:3e:e7:e6:d5:45:fd:26: a0:8b:7d:83:0a:ad:14:2f:dd:c0:eb:ee:28:49:d5:d6: 6b:db:24:c7:e4:35:fd:1b:6d:43:cb:18:4e:4c:52:5e: 7e:63:00:97:37:b8:20:ac:8c:5d:d0:7b:53:e4:f3:f5: bd:1f:de:52:6b:cd:ca:06:87:db:7e:ef:8f:28:21:3f: 1d:55:fa:77:50:d7:a2:c5:c8:cd:17:7e:66:ed:c2:29: f7:a7:4f:78:03:50:90:e8:61:fe:fd:8b:4e:9b:91:0d Fingerprint (MD5): C5:29:A0:F4:89:27:72:AE:3E:D7:6B:36:E5:EA:DC:AC Fingerprint (SHA1): F1:4C:F7:1E:32:5C:73:A2:97:B8:FB:BA:7F:A4:33:FB:96:ED:8D:D9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3064: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3065: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174264 (0x13710638) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:42:44 2012 Not After : Sun Mar 26 21:42:44 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:8d:5d:70:57:84:91:18:a5:d6:f5:aa:67:84:9c:de: 61:14:7e:98:2e:43:51:7e:9c:63:1c:04:23:c8:45:64: 31:14:3c:3a:f2:4e:66:cf:72:d8:1d:a3:2e:aa:2b:1c: aa:3a:36:13:34:eb:4b:9d:ab:8f:82:a7:cf:a3:5a:79: 58:fc:18:86:78:df:b5:1f:22:e4:5f:d7:65:e4:7b:51: 38:74:12:ab:22:be:2e:b9:e3:4a:bd:b0:34:b7:7f:a0: 08:1a:82:20:bd:c3:95:21:cc:fd:e6:a3:cd:b8:4e:f2: 04:f8:cd:c8:db:5d:d6:d8:67:bd:db:c9:53:61:c6:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 5a:bc:b6:5d:36:bb:78:1a:ea:c1:cd:d9:dc:52:7b:9e: bb:d0:42:7b:c5:43:7b:88:81:0d:18:89:d4:fc:c9:62: e5:0f:11:c3:5b:13:21:0d:83:52:42:52:5f:6a:a4:09: ce:df:97:b6:c4:fc:ae:40:79:fa:98:3a:fd:de:18:49: c2:f7:0b:7f:33:09:89:46:1e:3c:9e:e2:ef:41:3b:22: 77:85:2f:99:ee:59:8e:70:3d:bb:05:ea:38:88:9a:d9: bb:3e:b6:31:2a:c6:07:4e:ff:19:fc:bf:dd:e7:b3:2f: b5:fa:d9:6b:2f:20:07:aa:fa:2a:7b:8a:51:b8:7f:6f Fingerprint (MD5): 46:C6:0B:ED:40:C6:F6:F2:8E:26:53:41:5C:EB:F9:84 Fingerprint (SHA1): BD:35:28:0C:DA:B8:7B:06:D9:8F:8E:DB:9C:AF:84:1F:65:06:05:AE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3066: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3067: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3068: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174266 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3069: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3070: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3071: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3072: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174267 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3073: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3074: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3075: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3076: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174268 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3077: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3078: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #3079: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3080: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 326174269 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3081: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #3082: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #3083: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3084: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 326174270 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3085: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #3086: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3087: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174266 (0x1371063a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:42:46 2012 Not After : Sun Mar 26 21:42:46 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:92:a4:0b:89:24:dc:b3:97:ac:0c:ad:f1:ef:04:87: 5f:3f:66:f1:bc:78:a8:36:ee:4e:59:9f:ea:21:6d:4b: 68:d0:e2:9e:71:f6:3e:27:59:f9:a5:eb:e3:10:5b:8e: 3b:b6:9b:b1:6d:57:be:ce:0a:8a:96:51:d4:f5:55:46: 0c:9d:f9:9f:bb:bf:f6:3a:fc:5e:6d:83:5a:cc:0b:ef: 24:a2:fe:31:48:a8:8c:f8:d4:74:1f:7b:35:7d:a5:40: 3d:a9:84:aa:d6:60:15:f0:ad:87:98:11:a8:7a:72:a1: 7f:70:bf:22:c2:40:ca:ff:bd:6f:de:f4:5a:01:7a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 01:a7:54:79:85:3a:5a:d1:e7:f3:7d:c1:5c:e4:5c:a4: 77:b0:f2:f2:72:f4:5b:79:dc:37:04:a4:bf:ea:ba:0d: e9:f3:9e:f1:e2:92:2d:eb:d4:a3:82:4b:1e:0c:3d:18: 9e:2f:41:73:5a:f9:99:48:85:c0:91:d9:fa:ee:07:f0: a3:24:72:52:ec:e8:b9:3c:17:ce:2e:c3:6f:85:19:61: 3e:42:9a:2c:27:28:73:52:db:5b:06:27:ad:7a:f0:27: 16:82:bb:c1:fe:86:e1:5d:39:1c:7d:5e:f4:6f:68:6a: da:42:d2:1c:68:9f:b5:5e:a5:57:b6:c0:c7:dc:18:a4 Fingerprint (MD5): 2D:15:3F:12:AE:CB:DA:1F:13:24:10:56:59:FE:06:89 Fingerprint (SHA1): A2:91:17:ED:56:A0:EA:58:D1:31:C2:B4:97:2D:3B:F0:2B:49:E3:1C Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3088: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3089: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174267 (0x1371063b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:42:46 2012 Not After : Sun Mar 26 21:42:46 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:4a:ec:f1:d5:f0:13:c5:b3:15:2a:37:53:4a:0f:e1: e7:59:69:e2:f3:85:24:73:1b:81:41:08:61:03:8b:b2: f5:3d:3b:50:41:0c:1f:ac:7e:10:57:c4:bd:52:15:69: 2f:63:26:58:c5:56:c7:1a:c4:1f:0f:df:37:cd:91:ec: 80:40:ac:dc:58:b1:92:21:84:34:c7:ce:40:7f:73:51: 7e:71:7c:8a:b6:e4:8c:26:1f:2a:fa:27:a7:78:25:c3: c0:e4:29:43:8c:c4:11:43:03:7d:08:76:ea:9c:97:9a: f1:c1:63:89:5b:34:ff:3f:ac:7b:2c:fb:ea:0d:db:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1a:b5:60:75:c7:b3:a9:fa:71:d3:91:d7:29:34:5d:7f: 33:2e:c7:ad:cb:55:54:34:8a:25:ba:74:51:84:eb:63: 55:c6:92:2a:bf:28:7f:86:95:a9:e3:ed:87:ea:af:d3: 4b:72:20:ec:4b:7d:e9:87:93:00:b3:1f:e1:45:a9:c2: 58:eb:57:e9:f3:9c:f3:6a:23:56:5f:80:84:5b:5e:db: a0:97:0f:89:32:d5:c7:16:17:3f:f4:79:77:12:7f:33: 30:ea:fb:a6:e0:3d:2a:c0:ec:f6:ba:30:10:ca:9c:bb: 6c:99:47:e9:93:a3:96:20:e1:4c:2e:cd:60:35:50:bb Fingerprint (MD5): 65:EC:0F:54:64:B8:1C:07:84:D2:A6:13:AE:BE:BD:F2 Fingerprint (SHA1): B0:C3:35:E5:E4:36:AA:E6:98:4D:B4:B5:4D:21:15:D2:57:B5:35:21 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3090: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3091: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174268 (0x1371063c) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:42:47 2012 Not After : Sun Mar 26 21:42:47 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:4d:f8:be:b5:f9:52:9a:7b:8a:ff:72:95:e3:6e:57: b7:b6:6d:c6:1c:df:a1:52:ee:c1:6f:35:f7:5e:de:e0: 0b:65:d7:f8:e6:ef:85:ed:e3:c0:0e:10:0b:7a:e5:18: 8a:e6:2e:41:cc:a5:f8:39:cb:13:a8:57:d0:d6:79:28: db:7f:ec:a7:dd:f9:c6:d0:df:b2:f6:7d:c1:3d:82:27: a4:c8:3f:2f:ea:66:bd:e1:e5:fd:a0:e9:0a:d6:ec:63: 1a:ff:d2:ac:0d:82:fb:28:b3:39:e3:e7:22:fa:3a:65: e1:e7:0d:1f:b3:86:8d:55:dc:48:9d:f3:03:e4:40:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 20:fa:3c:2e:ec:ca:01:84:77:78:ab:ae:a4:28:3a:2a: 3a:57:74:50:28:7b:dd:0c:31:e5:c2:45:69:e8:ed:49: 04:c3:58:63:94:92:3d:68:93:7b:c7:3a:ea:7d:9a:da: 4b:37:e8:60:fb:e9:2e:1b:ed:94:c2:95:8a:0c:c7:6e: 24:fc:6a:24:56:dd:82:0c:19:9f:17:12:72:20:f5:68: 83:89:c1:81:40:a6:95:68:5b:3b:a4:8e:b5:38:37:05: c2:2a:20:3e:66:52:91:86:d5:8f:94:7e:2e:29:ff:4d: 8d:a8:63:8a:ff:07:c4:25:95:f0:06:f8:82:d3:93:fb Fingerprint (MD5): C5:69:79:2A:57:F4:B1:63:9A:E8:8D:A3:B3:B0:D5:40 Fingerprint (SHA1): 9F:DB:83:5D:77:4F:FE:C4:A5:43:41:5C:28:41:B4:32:E5:07:0A:DD Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #3092: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3093: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3094: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3095: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3096: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174266 (0x1371063a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:42:46 2012 Not After : Sun Mar 26 21:42:46 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:92:a4:0b:89:24:dc:b3:97:ac:0c:ad:f1:ef:04:87: 5f:3f:66:f1:bc:78:a8:36:ee:4e:59:9f:ea:21:6d:4b: 68:d0:e2:9e:71:f6:3e:27:59:f9:a5:eb:e3:10:5b:8e: 3b:b6:9b:b1:6d:57:be:ce:0a:8a:96:51:d4:f5:55:46: 0c:9d:f9:9f:bb:bf:f6:3a:fc:5e:6d:83:5a:cc:0b:ef: 24:a2:fe:31:48:a8:8c:f8:d4:74:1f:7b:35:7d:a5:40: 3d:a9:84:aa:d6:60:15:f0:ad:87:98:11:a8:7a:72:a1: 7f:70:bf:22:c2:40:ca:ff:bd:6f:de:f4:5a:01:7a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 01:a7:54:79:85:3a:5a:d1:e7:f3:7d:c1:5c:e4:5c:a4: 77:b0:f2:f2:72:f4:5b:79:dc:37:04:a4:bf:ea:ba:0d: e9:f3:9e:f1:e2:92:2d:eb:d4:a3:82:4b:1e:0c:3d:18: 9e:2f:41:73:5a:f9:99:48:85:c0:91:d9:fa:ee:07:f0: a3:24:72:52:ec:e8:b9:3c:17:ce:2e:c3:6f:85:19:61: 3e:42:9a:2c:27:28:73:52:db:5b:06:27:ad:7a:f0:27: 16:82:bb:c1:fe:86:e1:5d:39:1c:7d:5e:f4:6f:68:6a: da:42:d2:1c:68:9f:b5:5e:a5:57:b6:c0:c7:dc:18:a4 Fingerprint (MD5): 2D:15:3F:12:AE:CB:DA:1F:13:24:10:56:59:FE:06:89 Fingerprint (SHA1): A2:91:17:ED:56:A0:EA:58:D1:31:C2:B4:97:2D:3B:F0:2B:49:E3:1C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3097: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3098: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174267 (0x1371063b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:42:46 2012 Not After : Sun Mar 26 21:42:46 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:4a:ec:f1:d5:f0:13:c5:b3:15:2a:37:53:4a:0f:e1: e7:59:69:e2:f3:85:24:73:1b:81:41:08:61:03:8b:b2: f5:3d:3b:50:41:0c:1f:ac:7e:10:57:c4:bd:52:15:69: 2f:63:26:58:c5:56:c7:1a:c4:1f:0f:df:37:cd:91:ec: 80:40:ac:dc:58:b1:92:21:84:34:c7:ce:40:7f:73:51: 7e:71:7c:8a:b6:e4:8c:26:1f:2a:fa:27:a7:78:25:c3: c0:e4:29:43:8c:c4:11:43:03:7d:08:76:ea:9c:97:9a: f1:c1:63:89:5b:34:ff:3f:ac:7b:2c:fb:ea:0d:db:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1a:b5:60:75:c7:b3:a9:fa:71:d3:91:d7:29:34:5d:7f: 33:2e:c7:ad:cb:55:54:34:8a:25:ba:74:51:84:eb:63: 55:c6:92:2a:bf:28:7f:86:95:a9:e3:ed:87:ea:af:d3: 4b:72:20:ec:4b:7d:e9:87:93:00:b3:1f:e1:45:a9:c2: 58:eb:57:e9:f3:9c:f3:6a:23:56:5f:80:84:5b:5e:db: a0:97:0f:89:32:d5:c7:16:17:3f:f4:79:77:12:7f:33: 30:ea:fb:a6:e0:3d:2a:c0:ec:f6:ba:30:10:ca:9c:bb: 6c:99:47:e9:93:a3:96:20:e1:4c:2e:cd:60:35:50:bb Fingerprint (MD5): 65:EC:0F:54:64:B8:1C:07:84:D2:A6:13:AE:BE:BD:F2 Fingerprint (SHA1): B0:C3:35:E5:E4:36:AA:E6:98:4D:B4:B5:4D:21:15:D2:57:B5:35:21 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3099: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3100: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174268 (0x1371063c) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:42:47 2012 Not After : Sun Mar 26 21:42:47 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:4d:f8:be:b5:f9:52:9a:7b:8a:ff:72:95:e3:6e:57: b7:b6:6d:c6:1c:df:a1:52:ee:c1:6f:35:f7:5e:de:e0: 0b:65:d7:f8:e6:ef:85:ed:e3:c0:0e:10:0b:7a:e5:18: 8a:e6:2e:41:cc:a5:f8:39:cb:13:a8:57:d0:d6:79:28: db:7f:ec:a7:dd:f9:c6:d0:df:b2:f6:7d:c1:3d:82:27: a4:c8:3f:2f:ea:66:bd:e1:e5:fd:a0:e9:0a:d6:ec:63: 1a:ff:d2:ac:0d:82:fb:28:b3:39:e3:e7:22:fa:3a:65: e1:e7:0d:1f:b3:86:8d:55:dc:48:9d:f3:03:e4:40:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 20:fa:3c:2e:ec:ca:01:84:77:78:ab:ae:a4:28:3a:2a: 3a:57:74:50:28:7b:dd:0c:31:e5:c2:45:69:e8:ed:49: 04:c3:58:63:94:92:3d:68:93:7b:c7:3a:ea:7d:9a:da: 4b:37:e8:60:fb:e9:2e:1b:ed:94:c2:95:8a:0c:c7:6e: 24:fc:6a:24:56:dd:82:0c:19:9f:17:12:72:20:f5:68: 83:89:c1:81:40:a6:95:68:5b:3b:a4:8e:b5:38:37:05: c2:2a:20:3e:66:52:91:86:d5:8f:94:7e:2e:29:ff:4d: 8d:a8:63:8a:ff:07:c4:25:95:f0:06:f8:82:d3:93:fb Fingerprint (MD5): C5:69:79:2A:57:F4:B1:63:9A:E8:8D:A3:B3:B0:D5:40 Fingerprint (SHA1): 9F:DB:83:5D:77:4F:FE:C4:A5:43:41:5C:28:41:B4:32:E5:07:0A:DD Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #3101: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3102: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174266 (0x1371063a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:42:46 2012 Not After : Sun Mar 26 21:42:46 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:92:a4:0b:89:24:dc:b3:97:ac:0c:ad:f1:ef:04:87: 5f:3f:66:f1:bc:78:a8:36:ee:4e:59:9f:ea:21:6d:4b: 68:d0:e2:9e:71:f6:3e:27:59:f9:a5:eb:e3:10:5b:8e: 3b:b6:9b:b1:6d:57:be:ce:0a:8a:96:51:d4:f5:55:46: 0c:9d:f9:9f:bb:bf:f6:3a:fc:5e:6d:83:5a:cc:0b:ef: 24:a2:fe:31:48:a8:8c:f8:d4:74:1f:7b:35:7d:a5:40: 3d:a9:84:aa:d6:60:15:f0:ad:87:98:11:a8:7a:72:a1: 7f:70:bf:22:c2:40:ca:ff:bd:6f:de:f4:5a:01:7a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 01:a7:54:79:85:3a:5a:d1:e7:f3:7d:c1:5c:e4:5c:a4: 77:b0:f2:f2:72:f4:5b:79:dc:37:04:a4:bf:ea:ba:0d: e9:f3:9e:f1:e2:92:2d:eb:d4:a3:82:4b:1e:0c:3d:18: 9e:2f:41:73:5a:f9:99:48:85:c0:91:d9:fa:ee:07:f0: a3:24:72:52:ec:e8:b9:3c:17:ce:2e:c3:6f:85:19:61: 3e:42:9a:2c:27:28:73:52:db:5b:06:27:ad:7a:f0:27: 16:82:bb:c1:fe:86:e1:5d:39:1c:7d:5e:f4:6f:68:6a: da:42:d2:1c:68:9f:b5:5e:a5:57:b6:c0:c7:dc:18:a4 Fingerprint (MD5): 2D:15:3F:12:AE:CB:DA:1F:13:24:10:56:59:FE:06:89 Fingerprint (SHA1): A2:91:17:ED:56:A0:EA:58:D1:31:C2:B4:97:2D:3B:F0:2B:49:E3:1C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3103: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174266 (0x1371063a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:42:46 2012 Not After : Sun Mar 26 21:42:46 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:92:a4:0b:89:24:dc:b3:97:ac:0c:ad:f1:ef:04:87: 5f:3f:66:f1:bc:78:a8:36:ee:4e:59:9f:ea:21:6d:4b: 68:d0:e2:9e:71:f6:3e:27:59:f9:a5:eb:e3:10:5b:8e: 3b:b6:9b:b1:6d:57:be:ce:0a:8a:96:51:d4:f5:55:46: 0c:9d:f9:9f:bb:bf:f6:3a:fc:5e:6d:83:5a:cc:0b:ef: 24:a2:fe:31:48:a8:8c:f8:d4:74:1f:7b:35:7d:a5:40: 3d:a9:84:aa:d6:60:15:f0:ad:87:98:11:a8:7a:72:a1: 7f:70:bf:22:c2:40:ca:ff:bd:6f:de:f4:5a:01:7a:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 01:a7:54:79:85:3a:5a:d1:e7:f3:7d:c1:5c:e4:5c:a4: 77:b0:f2:f2:72:f4:5b:79:dc:37:04:a4:bf:ea:ba:0d: e9:f3:9e:f1:e2:92:2d:eb:d4:a3:82:4b:1e:0c:3d:18: 9e:2f:41:73:5a:f9:99:48:85:c0:91:d9:fa:ee:07:f0: a3:24:72:52:ec:e8:b9:3c:17:ce:2e:c3:6f:85:19:61: 3e:42:9a:2c:27:28:73:52:db:5b:06:27:ad:7a:f0:27: 16:82:bb:c1:fe:86:e1:5d:39:1c:7d:5e:f4:6f:68:6a: da:42:d2:1c:68:9f:b5:5e:a5:57:b6:c0:c7:dc:18:a4 Fingerprint (MD5): 2D:15:3F:12:AE:CB:DA:1F:13:24:10:56:59:FE:06:89 Fingerprint (SHA1): A2:91:17:ED:56:A0:EA:58:D1:31:C2:B4:97:2D:3B:F0:2B:49:E3:1C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3104: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174267 (0x1371063b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:42:46 2012 Not After : Sun Mar 26 21:42:46 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:4a:ec:f1:d5:f0:13:c5:b3:15:2a:37:53:4a:0f:e1: e7:59:69:e2:f3:85:24:73:1b:81:41:08:61:03:8b:b2: f5:3d:3b:50:41:0c:1f:ac:7e:10:57:c4:bd:52:15:69: 2f:63:26:58:c5:56:c7:1a:c4:1f:0f:df:37:cd:91:ec: 80:40:ac:dc:58:b1:92:21:84:34:c7:ce:40:7f:73:51: 7e:71:7c:8a:b6:e4:8c:26:1f:2a:fa:27:a7:78:25:c3: c0:e4:29:43:8c:c4:11:43:03:7d:08:76:ea:9c:97:9a: f1:c1:63:89:5b:34:ff:3f:ac:7b:2c:fb:ea:0d:db:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1a:b5:60:75:c7:b3:a9:fa:71:d3:91:d7:29:34:5d:7f: 33:2e:c7:ad:cb:55:54:34:8a:25:ba:74:51:84:eb:63: 55:c6:92:2a:bf:28:7f:86:95:a9:e3:ed:87:ea:af:d3: 4b:72:20:ec:4b:7d:e9:87:93:00:b3:1f:e1:45:a9:c2: 58:eb:57:e9:f3:9c:f3:6a:23:56:5f:80:84:5b:5e:db: a0:97:0f:89:32:d5:c7:16:17:3f:f4:79:77:12:7f:33: 30:ea:fb:a6:e0:3d:2a:c0:ec:f6:ba:30:10:ca:9c:bb: 6c:99:47:e9:93:a3:96:20:e1:4c:2e:cd:60:35:50:bb Fingerprint (MD5): 65:EC:0F:54:64:B8:1C:07:84:D2:A6:13:AE:BE:BD:F2 Fingerprint (SHA1): B0:C3:35:E5:E4:36:AA:E6:98:4D:B4:B5:4D:21:15:D2:57:B5:35:21 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3105: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174267 (0x1371063b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:42:46 2012 Not After : Sun Mar 26 21:42:46 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:4a:ec:f1:d5:f0:13:c5:b3:15:2a:37:53:4a:0f:e1: e7:59:69:e2:f3:85:24:73:1b:81:41:08:61:03:8b:b2: f5:3d:3b:50:41:0c:1f:ac:7e:10:57:c4:bd:52:15:69: 2f:63:26:58:c5:56:c7:1a:c4:1f:0f:df:37:cd:91:ec: 80:40:ac:dc:58:b1:92:21:84:34:c7:ce:40:7f:73:51: 7e:71:7c:8a:b6:e4:8c:26:1f:2a:fa:27:a7:78:25:c3: c0:e4:29:43:8c:c4:11:43:03:7d:08:76:ea:9c:97:9a: f1:c1:63:89:5b:34:ff:3f:ac:7b:2c:fb:ea:0d:db:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1a:b5:60:75:c7:b3:a9:fa:71:d3:91:d7:29:34:5d:7f: 33:2e:c7:ad:cb:55:54:34:8a:25:ba:74:51:84:eb:63: 55:c6:92:2a:bf:28:7f:86:95:a9:e3:ed:87:ea:af:d3: 4b:72:20:ec:4b:7d:e9:87:93:00:b3:1f:e1:45:a9:c2: 58:eb:57:e9:f3:9c:f3:6a:23:56:5f:80:84:5b:5e:db: a0:97:0f:89:32:d5:c7:16:17:3f:f4:79:77:12:7f:33: 30:ea:fb:a6:e0:3d:2a:c0:ec:f6:ba:30:10:ca:9c:bb: 6c:99:47:e9:93:a3:96:20:e1:4c:2e:cd:60:35:50:bb Fingerprint (MD5): 65:EC:0F:54:64:B8:1C:07:84:D2:A6:13:AE:BE:BD:F2 Fingerprint (SHA1): B0:C3:35:E5:E4:36:AA:E6:98:4D:B4:B5:4D:21:15:D2:57:B5:35:21 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3106: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174268 (0x1371063c) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:42:47 2012 Not After : Sun Mar 26 21:42:47 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:4d:f8:be:b5:f9:52:9a:7b:8a:ff:72:95:e3:6e:57: b7:b6:6d:c6:1c:df:a1:52:ee:c1:6f:35:f7:5e:de:e0: 0b:65:d7:f8:e6:ef:85:ed:e3:c0:0e:10:0b:7a:e5:18: 8a:e6:2e:41:cc:a5:f8:39:cb:13:a8:57:d0:d6:79:28: db:7f:ec:a7:dd:f9:c6:d0:df:b2:f6:7d:c1:3d:82:27: a4:c8:3f:2f:ea:66:bd:e1:e5:fd:a0:e9:0a:d6:ec:63: 1a:ff:d2:ac:0d:82:fb:28:b3:39:e3:e7:22:fa:3a:65: e1:e7:0d:1f:b3:86:8d:55:dc:48:9d:f3:03:e4:40:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 20:fa:3c:2e:ec:ca:01:84:77:78:ab:ae:a4:28:3a:2a: 3a:57:74:50:28:7b:dd:0c:31:e5:c2:45:69:e8:ed:49: 04:c3:58:63:94:92:3d:68:93:7b:c7:3a:ea:7d:9a:da: 4b:37:e8:60:fb:e9:2e:1b:ed:94:c2:95:8a:0c:c7:6e: 24:fc:6a:24:56:dd:82:0c:19:9f:17:12:72:20:f5:68: 83:89:c1:81:40:a6:95:68:5b:3b:a4:8e:b5:38:37:05: c2:2a:20:3e:66:52:91:86:d5:8f:94:7e:2e:29:ff:4d: 8d:a8:63:8a:ff:07:c4:25:95:f0:06:f8:82:d3:93:fb Fingerprint (MD5): C5:69:79:2A:57:F4:B1:63:9A:E8:8D:A3:B3:B0:D5:40 Fingerprint (SHA1): 9F:DB:83:5D:77:4F:FE:C4:A5:43:41:5C:28:41:B4:32:E5:07:0A:DD Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #3107: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174268 (0x1371063c) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:42:47 2012 Not After : Sun Mar 26 21:42:47 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:4d:f8:be:b5:f9:52:9a:7b:8a:ff:72:95:e3:6e:57: b7:b6:6d:c6:1c:df:a1:52:ee:c1:6f:35:f7:5e:de:e0: 0b:65:d7:f8:e6:ef:85:ed:e3:c0:0e:10:0b:7a:e5:18: 8a:e6:2e:41:cc:a5:f8:39:cb:13:a8:57:d0:d6:79:28: db:7f:ec:a7:dd:f9:c6:d0:df:b2:f6:7d:c1:3d:82:27: a4:c8:3f:2f:ea:66:bd:e1:e5:fd:a0:e9:0a:d6:ec:63: 1a:ff:d2:ac:0d:82:fb:28:b3:39:e3:e7:22:fa:3a:65: e1:e7:0d:1f:b3:86:8d:55:dc:48:9d:f3:03:e4:40:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 20:fa:3c:2e:ec:ca:01:84:77:78:ab:ae:a4:28:3a:2a: 3a:57:74:50:28:7b:dd:0c:31:e5:c2:45:69:e8:ed:49: 04:c3:58:63:94:92:3d:68:93:7b:c7:3a:ea:7d:9a:da: 4b:37:e8:60:fb:e9:2e:1b:ed:94:c2:95:8a:0c:c7:6e: 24:fc:6a:24:56:dd:82:0c:19:9f:17:12:72:20:f5:68: 83:89:c1:81:40:a6:95:68:5b:3b:a4:8e:b5:38:37:05: c2:2a:20:3e:66:52:91:86:d5:8f:94:7e:2e:29:ff:4d: 8d:a8:63:8a:ff:07:c4:25:95:f0:06:f8:82:d3:93:fb Fingerprint (MD5): C5:69:79:2A:57:F4:B1:63:9A:E8:8D:A3:B3:B0:D5:40 Fingerprint (SHA1): 9F:DB:83:5D:77:4F:FE:C4:A5:43:41:5C:28:41:B4:32:E5:07:0A:DD Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #3108: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #3109: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174271 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3110: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #3111: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3112: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3113: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 326174272 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3114: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #3115: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3116: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3117: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174273 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3118: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3119: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3120: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3121: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 326174274 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3122: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der chains.sh: #3123: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #3124: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3125: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 326174275 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3126: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #3127: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #3128: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3129: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 326174276 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3130: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #3131: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #3132: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3133: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 326174277 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3134: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der chains.sh: #3135: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3136: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #3137: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #3138: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3139: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #3140: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174271 (0x1371063f) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:42:49 2012 Not After : Sun Mar 26 21:42:49 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:96:df:35:7c:9e:25:53:8c:94:20:34:26:37:dd:50: 0d:37:7d:92:c6:54:38:bb:30:4f:c0:b5:7a:36:e5:03: 32:25:9a:b1:ad:9e:19:dd:bd:51:a8:e8:6e:c8:ee:b2: 53:22:a3:93:00:8e:2d:8d:c3:ef:d9:99:a8:e7:30:8c: 75:64:bf:fd:e3:a6:24:88:f1:72:ca:80:c8:bf:3f:60: be:2a:99:4e:51:cb:34:8c:75:a9:98:55:7f:24:f7:ec: ce:9b:89:f6:3c:00:8b:e7:c4:c5:67:6d:dc:4c:6c:0d: 47:03:e0:23:cb:91:6d:90:eb:8e:8a:f1:2a:7f:bd:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2b:25:a6:79:78:c3:ae:6c:05:51:0d:20:a3:bf:fe:ba: f4:46:4e:79:4c:e8:eb:67:c4:48:e7:70:09:15:ed:16: 9b:8b:d5:30:41:de:29:0e:8d:28:31:49:f1:d8:31:a4: 1c:3c:cd:c0:6d:9f:df:06:d7:83:8e:55:38:b5:ec:bb: 85:f7:4c:55:0e:58:37:a7:66:7c:e7:f7:28:d8:70:54: 99:35:95:5b:92:bb:70:77:d9:ac:73:6c:bd:28:bb:16: cc:a2:e5:3f:ff:55:a6:b4:b2:1b:b6:dd:2a:2c:10:df: fc:b2:31:ed:26:4f:7f:bf:f7:17:6e:88:0e:3c:ee:c3 Fingerprint (MD5): ED:53:6A:F1:33:67:7D:60:2B:4A:77:95:47:8B:7F:ED Fingerprint (SHA1): F5:E7:B5:7A:16:57:8F:51:9E:17:C5:8A:CE:7C:67:0C:95:F0:31:9C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3141: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3142: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3143: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3144: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174271 (0x1371063f) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:42:49 2012 Not After : Sun Mar 26 21:42:49 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:96:df:35:7c:9e:25:53:8c:94:20:34:26:37:dd:50: 0d:37:7d:92:c6:54:38:bb:30:4f:c0:b5:7a:36:e5:03: 32:25:9a:b1:ad:9e:19:dd:bd:51:a8:e8:6e:c8:ee:b2: 53:22:a3:93:00:8e:2d:8d:c3:ef:d9:99:a8:e7:30:8c: 75:64:bf:fd:e3:a6:24:88:f1:72:ca:80:c8:bf:3f:60: be:2a:99:4e:51:cb:34:8c:75:a9:98:55:7f:24:f7:ec: ce:9b:89:f6:3c:00:8b:e7:c4:c5:67:6d:dc:4c:6c:0d: 47:03:e0:23:cb:91:6d:90:eb:8e:8a:f1:2a:7f:bd:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2b:25:a6:79:78:c3:ae:6c:05:51:0d:20:a3:bf:fe:ba: f4:46:4e:79:4c:e8:eb:67:c4:48:e7:70:09:15:ed:16: 9b:8b:d5:30:41:de:29:0e:8d:28:31:49:f1:d8:31:a4: 1c:3c:cd:c0:6d:9f:df:06:d7:83:8e:55:38:b5:ec:bb: 85:f7:4c:55:0e:58:37:a7:66:7c:e7:f7:28:d8:70:54: 99:35:95:5b:92:bb:70:77:d9:ac:73:6c:bd:28:bb:16: cc:a2:e5:3f:ff:55:a6:b4:b2:1b:b6:dd:2a:2c:10:df: fc:b2:31:ed:26:4f:7f:bf:f7:17:6e:88:0e:3c:ee:c3 Fingerprint (MD5): ED:53:6A:F1:33:67:7D:60:2B:4A:77:95:47:8B:7F:ED Fingerprint (SHA1): F5:E7:B5:7A:16:57:8F:51:9E:17:C5:8A:CE:7C:67:0C:95:F0:31:9C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3145: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3146: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #3147: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174278 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3148: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #3149: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3150: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3151: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 326174279 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3152: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #3153: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #3154: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3155: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 326174280 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3156: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der chains.sh: #3157: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #3158: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3159: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 326174281 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3160: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der chains.sh: #3161: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3162: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3163: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 326174282 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3164: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der chains.sh: #3165: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #3166: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3167: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 326174283 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3168: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der chains.sh: #3169: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #3170: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3171: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 326174284 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3172: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der chains.sh: #3173: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3174: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3175: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 326174285 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3176: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der chains.sh: #3177: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #3178: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3179: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 326174286 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3180: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der chains.sh: #3181: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #3182: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3183: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 326174287 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3184: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der chains.sh: #3185: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #3186: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3187: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 326174288 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3188: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der chains.sh: #3189: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #3190: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3191: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 326174289 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3192: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der chains.sh: #3193: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #3194: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3195: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 326174290 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3196: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der chains.sh: #3197: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #3198: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3199: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 326174291 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3200: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der chains.sh: #3201: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #3202: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3203: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 326174292 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3204: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der chains.sh: #3205: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #3206: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3207: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 326174293 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3208: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der chains.sh: #3209: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #3210: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3211: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 326174294 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3212: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der chains.sh: #3213: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #3214: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3215: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 326174295 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3216: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der chains.sh: #3217: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #3218: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3219: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 326174296 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3220: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der chains.sh: #3221: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #3222: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3223: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 326174297 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3224: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der chains.sh: #3225: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #3226: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3227: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 326174298 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3228: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der chains.sh: #3229: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #3230: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3231: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 326174299 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3232: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der chains.sh: #3233: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #3234: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3235: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 326174300 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3236: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der chains.sh: #3237: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #3238: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3239: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 326174301 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3240: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der chains.sh: #3241: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #3242: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3243: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 326174302 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3244: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der chains.sh: #3245: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #3246: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3247: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 326174303 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3248: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der chains.sh: #3249: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #3250: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3251: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 326174304 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3252: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der chains.sh: #3253: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #3254: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3255: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 326174305 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3256: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der chains.sh: #3257: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #3258: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3259: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 326174306 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3260: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der chains.sh: #3261: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #3262: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3263: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 326174307 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3264: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der chains.sh: #3265: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3266: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174278 (0x13710646) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:42:52 2012 Not After : Sun Mar 26 21:42:52 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:31:e4:02:fd:e0:d1:c3:10:18:27:82:f9:f1:6a:c6: a1:fe:16:28:72:75:57:c9:ba:bf:95:09:50:07:19:08: ef:0c:68:27:06:9b:5e:4f:f2:28:d1:c4:38:e1:6d:fe: 42:c1:d8:94:0c:5e:ee:3c:b3:1f:8f:dc:52:55:a4:c0: 06:4d:1f:29:63:a5:9e:c9:0a:1c:d7:43:6a:3c:b2:e3: e8:b5:29:df:04:c9:43:65:16:14:52:93:0d:ce:70:48: a8:5f:99:6a:4c:02:ad:12:88:56:06:ac:57:7a:97:98: 1d:c5:f7:1c:9d:86:02:6c:8c:d5:1c:01:6c:1e:53:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 02:54:34:60:5d:23:1d:47:da:e6:05:70:0d:72:74:35: 83:7d:39:ac:41:86:80:db:ec:81:e2:aa:b5:5f:c2:db: fa:90:53:2b:7d:02:cc:3e:7c:9c:76:71:89:16:17:e0: 0f:eb:0e:95:30:21:44:0b:17:28:d3:c2:28:99:be:5f: b7:e5:e4:84:e6:86:03:b1:1b:68:8b:6b:7e:52:e7:78: 62:fa:55:62:3e:2d:54:81:fb:db:68:ce:7c:a3:e9:65: d4:b5:a8:4b:3b:24:27:d4:f6:b7:c3:7a:e5:91:d0:3d: 98:5a:04:66:0d:e2:2b:01:7a:06:05:f3:68:35:5f:d8 Fingerprint (MD5): F1:E6:E7:C4:34:0C:28:5C:0F:33:43:89:90:DB:0B:54 Fingerprint (SHA1): 88:96:40:48:4F:C0:4E:5F:76:B7:9F:43:62:49:AB:8C:24:77:4B:17 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3267: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3268: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174278 (0x13710646) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:42:52 2012 Not After : Sun Mar 26 21:42:52 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:31:e4:02:fd:e0:d1:c3:10:18:27:82:f9:f1:6a:c6: a1:fe:16:28:72:75:57:c9:ba:bf:95:09:50:07:19:08: ef:0c:68:27:06:9b:5e:4f:f2:28:d1:c4:38:e1:6d:fe: 42:c1:d8:94:0c:5e:ee:3c:b3:1f:8f:dc:52:55:a4:c0: 06:4d:1f:29:63:a5:9e:c9:0a:1c:d7:43:6a:3c:b2:e3: e8:b5:29:df:04:c9:43:65:16:14:52:93:0d:ce:70:48: a8:5f:99:6a:4c:02:ad:12:88:56:06:ac:57:7a:97:98: 1d:c5:f7:1c:9d:86:02:6c:8c:d5:1c:01:6c:1e:53:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 02:54:34:60:5d:23:1d:47:da:e6:05:70:0d:72:74:35: 83:7d:39:ac:41:86:80:db:ec:81:e2:aa:b5:5f:c2:db: fa:90:53:2b:7d:02:cc:3e:7c:9c:76:71:89:16:17:e0: 0f:eb:0e:95:30:21:44:0b:17:28:d3:c2:28:99:be:5f: b7:e5:e4:84:e6:86:03:b1:1b:68:8b:6b:7e:52:e7:78: 62:fa:55:62:3e:2d:54:81:fb:db:68:ce:7c:a3:e9:65: d4:b5:a8:4b:3b:24:27:d4:f6:b7:c3:7a:e5:91:d0:3d: 98:5a:04:66:0d:e2:2b:01:7a:06:05:f3:68:35:5f:d8 Fingerprint (MD5): F1:E6:E7:C4:34:0C:28:5C:0F:33:43:89:90:DB:0B:54 Fingerprint (SHA1): 88:96:40:48:4F:C0:4E:5F:76:B7:9F:43:62:49:AB:8C:24:77:4B:17 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3269: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3270: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3271: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3272: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174278 (0x13710646) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:42:52 2012 Not After : Sun Mar 26 21:42:52 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:31:e4:02:fd:e0:d1:c3:10:18:27:82:f9:f1:6a:c6: a1:fe:16:28:72:75:57:c9:ba:bf:95:09:50:07:19:08: ef:0c:68:27:06:9b:5e:4f:f2:28:d1:c4:38:e1:6d:fe: 42:c1:d8:94:0c:5e:ee:3c:b3:1f:8f:dc:52:55:a4:c0: 06:4d:1f:29:63:a5:9e:c9:0a:1c:d7:43:6a:3c:b2:e3: e8:b5:29:df:04:c9:43:65:16:14:52:93:0d:ce:70:48: a8:5f:99:6a:4c:02:ad:12:88:56:06:ac:57:7a:97:98: 1d:c5:f7:1c:9d:86:02:6c:8c:d5:1c:01:6c:1e:53:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 02:54:34:60:5d:23:1d:47:da:e6:05:70:0d:72:74:35: 83:7d:39:ac:41:86:80:db:ec:81:e2:aa:b5:5f:c2:db: fa:90:53:2b:7d:02:cc:3e:7c:9c:76:71:89:16:17:e0: 0f:eb:0e:95:30:21:44:0b:17:28:d3:c2:28:99:be:5f: b7:e5:e4:84:e6:86:03:b1:1b:68:8b:6b:7e:52:e7:78: 62:fa:55:62:3e:2d:54:81:fb:db:68:ce:7c:a3:e9:65: d4:b5:a8:4b:3b:24:27:d4:f6:b7:c3:7a:e5:91:d0:3d: 98:5a:04:66:0d:e2:2b:01:7a:06:05:f3:68:35:5f:d8 Fingerprint (MD5): F1:E6:E7:C4:34:0C:28:5C:0F:33:43:89:90:DB:0B:54 Fingerprint (SHA1): 88:96:40:48:4F:C0:4E:5F:76:B7:9F:43:62:49:AB:8C:24:77:4B:17 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3273: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3274: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3275: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3276: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174278 (0x13710646) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:42:52 2012 Not After : Sun Mar 26 21:42:52 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:31:e4:02:fd:e0:d1:c3:10:18:27:82:f9:f1:6a:c6: a1:fe:16:28:72:75:57:c9:ba:bf:95:09:50:07:19:08: ef:0c:68:27:06:9b:5e:4f:f2:28:d1:c4:38:e1:6d:fe: 42:c1:d8:94:0c:5e:ee:3c:b3:1f:8f:dc:52:55:a4:c0: 06:4d:1f:29:63:a5:9e:c9:0a:1c:d7:43:6a:3c:b2:e3: e8:b5:29:df:04:c9:43:65:16:14:52:93:0d:ce:70:48: a8:5f:99:6a:4c:02:ad:12:88:56:06:ac:57:7a:97:98: 1d:c5:f7:1c:9d:86:02:6c:8c:d5:1c:01:6c:1e:53:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 02:54:34:60:5d:23:1d:47:da:e6:05:70:0d:72:74:35: 83:7d:39:ac:41:86:80:db:ec:81:e2:aa:b5:5f:c2:db: fa:90:53:2b:7d:02:cc:3e:7c:9c:76:71:89:16:17:e0: 0f:eb:0e:95:30:21:44:0b:17:28:d3:c2:28:99:be:5f: b7:e5:e4:84:e6:86:03:b1:1b:68:8b:6b:7e:52:e7:78: 62:fa:55:62:3e:2d:54:81:fb:db:68:ce:7c:a3:e9:65: d4:b5:a8:4b:3b:24:27:d4:f6:b7:c3:7a:e5:91:d0:3d: 98:5a:04:66:0d:e2:2b:01:7a:06:05:f3:68:35:5f:d8 Fingerprint (MD5): F1:E6:E7:C4:34:0C:28:5C:0F:33:43:89:90:DB:0B:54 Fingerprint (SHA1): 88:96:40:48:4F:C0:4E:5F:76:B7:9F:43:62:49:AB:8C:24:77:4B:17 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3277: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174278 (0x13710646) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:42:52 2012 Not After : Sun Mar 26 21:42:52 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:31:e4:02:fd:e0:d1:c3:10:18:27:82:f9:f1:6a:c6: a1:fe:16:28:72:75:57:c9:ba:bf:95:09:50:07:19:08: ef:0c:68:27:06:9b:5e:4f:f2:28:d1:c4:38:e1:6d:fe: 42:c1:d8:94:0c:5e:ee:3c:b3:1f:8f:dc:52:55:a4:c0: 06:4d:1f:29:63:a5:9e:c9:0a:1c:d7:43:6a:3c:b2:e3: e8:b5:29:df:04:c9:43:65:16:14:52:93:0d:ce:70:48: a8:5f:99:6a:4c:02:ad:12:88:56:06:ac:57:7a:97:98: 1d:c5:f7:1c:9d:86:02:6c:8c:d5:1c:01:6c:1e:53:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 02:54:34:60:5d:23:1d:47:da:e6:05:70:0d:72:74:35: 83:7d:39:ac:41:86:80:db:ec:81:e2:aa:b5:5f:c2:db: fa:90:53:2b:7d:02:cc:3e:7c:9c:76:71:89:16:17:e0: 0f:eb:0e:95:30:21:44:0b:17:28:d3:c2:28:99:be:5f: b7:e5:e4:84:e6:86:03:b1:1b:68:8b:6b:7e:52:e7:78: 62:fa:55:62:3e:2d:54:81:fb:db:68:ce:7c:a3:e9:65: d4:b5:a8:4b:3b:24:27:d4:f6:b7:c3:7a:e5:91:d0:3d: 98:5a:04:66:0d:e2:2b:01:7a:06:05:f3:68:35:5f:d8 Fingerprint (MD5): F1:E6:E7:C4:34:0C:28:5C:0F:33:43:89:90:DB:0B:54 Fingerprint (SHA1): 88:96:40:48:4F:C0:4E:5F:76:B7:9F:43:62:49:AB:8C:24:77:4B:17 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3278: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3279: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174278 (0x13710646) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:42:52 2012 Not After : Sun Mar 26 21:42:52 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:31:e4:02:fd:e0:d1:c3:10:18:27:82:f9:f1:6a:c6: a1:fe:16:28:72:75:57:c9:ba:bf:95:09:50:07:19:08: ef:0c:68:27:06:9b:5e:4f:f2:28:d1:c4:38:e1:6d:fe: 42:c1:d8:94:0c:5e:ee:3c:b3:1f:8f:dc:52:55:a4:c0: 06:4d:1f:29:63:a5:9e:c9:0a:1c:d7:43:6a:3c:b2:e3: e8:b5:29:df:04:c9:43:65:16:14:52:93:0d:ce:70:48: a8:5f:99:6a:4c:02:ad:12:88:56:06:ac:57:7a:97:98: 1d:c5:f7:1c:9d:86:02:6c:8c:d5:1c:01:6c:1e:53:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 02:54:34:60:5d:23:1d:47:da:e6:05:70:0d:72:74:35: 83:7d:39:ac:41:86:80:db:ec:81:e2:aa:b5:5f:c2:db: fa:90:53:2b:7d:02:cc:3e:7c:9c:76:71:89:16:17:e0: 0f:eb:0e:95:30:21:44:0b:17:28:d3:c2:28:99:be:5f: b7:e5:e4:84:e6:86:03:b1:1b:68:8b:6b:7e:52:e7:78: 62:fa:55:62:3e:2d:54:81:fb:db:68:ce:7c:a3:e9:65: d4:b5:a8:4b:3b:24:27:d4:f6:b7:c3:7a:e5:91:d0:3d: 98:5a:04:66:0d:e2:2b:01:7a:06:05:f3:68:35:5f:d8 Fingerprint (MD5): F1:E6:E7:C4:34:0C:28:5C:0F:33:43:89:90:DB:0B:54 Fingerprint (SHA1): 88:96:40:48:4F:C0:4E:5F:76:B7:9F:43:62:49:AB:8C:24:77:4B:17 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3280: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3281: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3282: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3283: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174278 (0x13710646) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:42:52 2012 Not After : Sun Mar 26 21:42:52 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:31:e4:02:fd:e0:d1:c3:10:18:27:82:f9:f1:6a:c6: a1:fe:16:28:72:75:57:c9:ba:bf:95:09:50:07:19:08: ef:0c:68:27:06:9b:5e:4f:f2:28:d1:c4:38:e1:6d:fe: 42:c1:d8:94:0c:5e:ee:3c:b3:1f:8f:dc:52:55:a4:c0: 06:4d:1f:29:63:a5:9e:c9:0a:1c:d7:43:6a:3c:b2:e3: e8:b5:29:df:04:c9:43:65:16:14:52:93:0d:ce:70:48: a8:5f:99:6a:4c:02:ad:12:88:56:06:ac:57:7a:97:98: 1d:c5:f7:1c:9d:86:02:6c:8c:d5:1c:01:6c:1e:53:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 02:54:34:60:5d:23:1d:47:da:e6:05:70:0d:72:74:35: 83:7d:39:ac:41:86:80:db:ec:81:e2:aa:b5:5f:c2:db: fa:90:53:2b:7d:02:cc:3e:7c:9c:76:71:89:16:17:e0: 0f:eb:0e:95:30:21:44:0b:17:28:d3:c2:28:99:be:5f: b7:e5:e4:84:e6:86:03:b1:1b:68:8b:6b:7e:52:e7:78: 62:fa:55:62:3e:2d:54:81:fb:db:68:ce:7c:a3:e9:65: d4:b5:a8:4b:3b:24:27:d4:f6:b7:c3:7a:e5:91:d0:3d: 98:5a:04:66:0d:e2:2b:01:7a:06:05:f3:68:35:5f:d8 Fingerprint (MD5): F1:E6:E7:C4:34:0C:28:5C:0F:33:43:89:90:DB:0B:54 Fingerprint (SHA1): 88:96:40:48:4F:C0:4E:5F:76:B7:9F:43:62:49:AB:8C:24:77:4B:17 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3284: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174278 (0x13710646) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:42:52 2012 Not After : Sun Mar 26 21:42:52 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:31:e4:02:fd:e0:d1:c3:10:18:27:82:f9:f1:6a:c6: a1:fe:16:28:72:75:57:c9:ba:bf:95:09:50:07:19:08: ef:0c:68:27:06:9b:5e:4f:f2:28:d1:c4:38:e1:6d:fe: 42:c1:d8:94:0c:5e:ee:3c:b3:1f:8f:dc:52:55:a4:c0: 06:4d:1f:29:63:a5:9e:c9:0a:1c:d7:43:6a:3c:b2:e3: e8:b5:29:df:04:c9:43:65:16:14:52:93:0d:ce:70:48: a8:5f:99:6a:4c:02:ad:12:88:56:06:ac:57:7a:97:98: 1d:c5:f7:1c:9d:86:02:6c:8c:d5:1c:01:6c:1e:53:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 02:54:34:60:5d:23:1d:47:da:e6:05:70:0d:72:74:35: 83:7d:39:ac:41:86:80:db:ec:81:e2:aa:b5:5f:c2:db: fa:90:53:2b:7d:02:cc:3e:7c:9c:76:71:89:16:17:e0: 0f:eb:0e:95:30:21:44:0b:17:28:d3:c2:28:99:be:5f: b7:e5:e4:84:e6:86:03:b1:1b:68:8b:6b:7e:52:e7:78: 62:fa:55:62:3e:2d:54:81:fb:db:68:ce:7c:a3:e9:65: d4:b5:a8:4b:3b:24:27:d4:f6:b7:c3:7a:e5:91:d0:3d: 98:5a:04:66:0d:e2:2b:01:7a:06:05:f3:68:35:5f:d8 Fingerprint (MD5): F1:E6:E7:C4:34:0C:28:5C:0F:33:43:89:90:DB:0B:54 Fingerprint (SHA1): 88:96:40:48:4F:C0:4E:5F:76:B7:9F:43:62:49:AB:8C:24:77:4B:17 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3285: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174278 (0x13710646) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:42:52 2012 Not After : Sun Mar 26 21:42:52 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:31:e4:02:fd:e0:d1:c3:10:18:27:82:f9:f1:6a:c6: a1:fe:16:28:72:75:57:c9:ba:bf:95:09:50:07:19:08: ef:0c:68:27:06:9b:5e:4f:f2:28:d1:c4:38:e1:6d:fe: 42:c1:d8:94:0c:5e:ee:3c:b3:1f:8f:dc:52:55:a4:c0: 06:4d:1f:29:63:a5:9e:c9:0a:1c:d7:43:6a:3c:b2:e3: e8:b5:29:df:04:c9:43:65:16:14:52:93:0d:ce:70:48: a8:5f:99:6a:4c:02:ad:12:88:56:06:ac:57:7a:97:98: 1d:c5:f7:1c:9d:86:02:6c:8c:d5:1c:01:6c:1e:53:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 02:54:34:60:5d:23:1d:47:da:e6:05:70:0d:72:74:35: 83:7d:39:ac:41:86:80:db:ec:81:e2:aa:b5:5f:c2:db: fa:90:53:2b:7d:02:cc:3e:7c:9c:76:71:89:16:17:e0: 0f:eb:0e:95:30:21:44:0b:17:28:d3:c2:28:99:be:5f: b7:e5:e4:84:e6:86:03:b1:1b:68:8b:6b:7e:52:e7:78: 62:fa:55:62:3e:2d:54:81:fb:db:68:ce:7c:a3:e9:65: d4:b5:a8:4b:3b:24:27:d4:f6:b7:c3:7a:e5:91:d0:3d: 98:5a:04:66:0d:e2:2b:01:7a:06:05:f3:68:35:5f:d8 Fingerprint (MD5): F1:E6:E7:C4:34:0C:28:5C:0F:33:43:89:90:DB:0B:54 Fingerprint (SHA1): 88:96:40:48:4F:C0:4E:5F:76:B7:9F:43:62:49:AB:8C:24:77:4B:17 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3286: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174278 (0x13710646) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:42:52 2012 Not After : Sun Mar 26 21:42:52 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:31:e4:02:fd:e0:d1:c3:10:18:27:82:f9:f1:6a:c6: a1:fe:16:28:72:75:57:c9:ba:bf:95:09:50:07:19:08: ef:0c:68:27:06:9b:5e:4f:f2:28:d1:c4:38:e1:6d:fe: 42:c1:d8:94:0c:5e:ee:3c:b3:1f:8f:dc:52:55:a4:c0: 06:4d:1f:29:63:a5:9e:c9:0a:1c:d7:43:6a:3c:b2:e3: e8:b5:29:df:04:c9:43:65:16:14:52:93:0d:ce:70:48: a8:5f:99:6a:4c:02:ad:12:88:56:06:ac:57:7a:97:98: 1d:c5:f7:1c:9d:86:02:6c:8c:d5:1c:01:6c:1e:53:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 02:54:34:60:5d:23:1d:47:da:e6:05:70:0d:72:74:35: 83:7d:39:ac:41:86:80:db:ec:81:e2:aa:b5:5f:c2:db: fa:90:53:2b:7d:02:cc:3e:7c:9c:76:71:89:16:17:e0: 0f:eb:0e:95:30:21:44:0b:17:28:d3:c2:28:99:be:5f: b7:e5:e4:84:e6:86:03:b1:1b:68:8b:6b:7e:52:e7:78: 62:fa:55:62:3e:2d:54:81:fb:db:68:ce:7c:a3:e9:65: d4:b5:a8:4b:3b:24:27:d4:f6:b7:c3:7a:e5:91:d0:3d: 98:5a:04:66:0d:e2:2b:01:7a:06:05:f3:68:35:5f:d8 Fingerprint (MD5): F1:E6:E7:C4:34:0C:28:5C:0F:33:43:89:90:DB:0B:54 Fingerprint (SHA1): 88:96:40:48:4F:C0:4E:5F:76:B7:9F:43:62:49:AB:8C:24:77:4B:17 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3287: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174278 (0x13710646) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:42:52 2012 Not After : Sun Mar 26 21:42:52 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:31:e4:02:fd:e0:d1:c3:10:18:27:82:f9:f1:6a:c6: a1:fe:16:28:72:75:57:c9:ba:bf:95:09:50:07:19:08: ef:0c:68:27:06:9b:5e:4f:f2:28:d1:c4:38:e1:6d:fe: 42:c1:d8:94:0c:5e:ee:3c:b3:1f:8f:dc:52:55:a4:c0: 06:4d:1f:29:63:a5:9e:c9:0a:1c:d7:43:6a:3c:b2:e3: e8:b5:29:df:04:c9:43:65:16:14:52:93:0d:ce:70:48: a8:5f:99:6a:4c:02:ad:12:88:56:06:ac:57:7a:97:98: 1d:c5:f7:1c:9d:86:02:6c:8c:d5:1c:01:6c:1e:53:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 02:54:34:60:5d:23:1d:47:da:e6:05:70:0d:72:74:35: 83:7d:39:ac:41:86:80:db:ec:81:e2:aa:b5:5f:c2:db: fa:90:53:2b:7d:02:cc:3e:7c:9c:76:71:89:16:17:e0: 0f:eb:0e:95:30:21:44:0b:17:28:d3:c2:28:99:be:5f: b7:e5:e4:84:e6:86:03:b1:1b:68:8b:6b:7e:52:e7:78: 62:fa:55:62:3e:2d:54:81:fb:db:68:ce:7c:a3:e9:65: d4:b5:a8:4b:3b:24:27:d4:f6:b7:c3:7a:e5:91:d0:3d: 98:5a:04:66:0d:e2:2b:01:7a:06:05:f3:68:35:5f:d8 Fingerprint (MD5): F1:E6:E7:C4:34:0C:28:5C:0F:33:43:89:90:DB:0B:54 Fingerprint (SHA1): 88:96:40:48:4F:C0:4E:5F:76:B7:9F:43:62:49:AB:8C:24:77:4B:17 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3288: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174278 (0x13710646) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:42:52 2012 Not After : Sun Mar 26 21:42:52 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:31:e4:02:fd:e0:d1:c3:10:18:27:82:f9:f1:6a:c6: a1:fe:16:28:72:75:57:c9:ba:bf:95:09:50:07:19:08: ef:0c:68:27:06:9b:5e:4f:f2:28:d1:c4:38:e1:6d:fe: 42:c1:d8:94:0c:5e:ee:3c:b3:1f:8f:dc:52:55:a4:c0: 06:4d:1f:29:63:a5:9e:c9:0a:1c:d7:43:6a:3c:b2:e3: e8:b5:29:df:04:c9:43:65:16:14:52:93:0d:ce:70:48: a8:5f:99:6a:4c:02:ad:12:88:56:06:ac:57:7a:97:98: 1d:c5:f7:1c:9d:86:02:6c:8c:d5:1c:01:6c:1e:53:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 02:54:34:60:5d:23:1d:47:da:e6:05:70:0d:72:74:35: 83:7d:39:ac:41:86:80:db:ec:81:e2:aa:b5:5f:c2:db: fa:90:53:2b:7d:02:cc:3e:7c:9c:76:71:89:16:17:e0: 0f:eb:0e:95:30:21:44:0b:17:28:d3:c2:28:99:be:5f: b7:e5:e4:84:e6:86:03:b1:1b:68:8b:6b:7e:52:e7:78: 62:fa:55:62:3e:2d:54:81:fb:db:68:ce:7c:a3:e9:65: d4:b5:a8:4b:3b:24:27:d4:f6:b7:c3:7a:e5:91:d0:3d: 98:5a:04:66:0d:e2:2b:01:7a:06:05:f3:68:35:5f:d8 Fingerprint (MD5): F1:E6:E7:C4:34:0C:28:5C:0F:33:43:89:90:DB:0B:54 Fingerprint (SHA1): 88:96:40:48:4F:C0:4E:5F:76:B7:9F:43:62:49:AB:8C:24:77:4B:17 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3289: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3290: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3291: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174308 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3292: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3293: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #3294: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3295: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 326174309 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3296: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der chains.sh: #3297: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #3298: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3299: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 326174310 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3300: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der chains.sh: #3301: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #3302: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3303: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 326174311 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3304: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der chains.sh: #3305: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #3306: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3307: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 326174312 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3308: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der chains.sh: #3309: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #3310: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3311: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 326174313 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3312: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der chains.sh: #3313: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #3314: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3315: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 326174314 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3316: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der chains.sh: #3317: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3318: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174308 (0x13710664) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:43:05 2012 Not After : Sun Mar 26 21:43:05 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:c0:18:e6:74:eb:5b:3f:9d:53:d4:d0:14:93:13:84: c7:bd:b7:15:f7:a3:ae:a9:42:06:15:e6:2d:ce:93:81: b4:0b:cf:90:6e:c6:f7:0b:8e:95:0b:0d:db:29:58:5e: 24:a6:77:5d:98:b0:e4:d2:3d:c2:f3:d0:12:79:77:43: ee:4d:b1:79:0b:f8:50:73:56:4f:3b:69:c0:41:bf:25: f3:8b:38:01:54:34:6e:b4:ea:88:57:67:01:3d:da:20: e3:84:da:aa:78:76:ac:03:9d:92:ae:e9:0d:77:13:ca: 7f:8b:ff:70:54:e9:04:47:5a:4e:15:24:e0:d1:e9:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3c:80:87:93:25:6d:9b:72:ce:02:ad:7f:97:e5:8c:d9: 48:66:51:75:07:36:a1:a0:b9:62:5f:67:38:51:6a:af: 4d:6a:70:1d:51:e8:b4:87:db:2b:f9:61:6d:62:4d:9d: b7:72:fb:9a:77:ed:0c:52:03:e8:83:4b:cc:13:09:77: ed:7b:c8:a1:eb:1f:26:5a:1a:b8:23:7b:45:25:61:4e: 1a:b8:9f:0e:8f:58:e5:01:08:d4:9f:95:84:a0:83:69: 08:39:76:9a:7c:60:a9:1d:f0:d0:c3:39:ec:2a:de:ab: 25:4b:53:b7:ff:85:1f:72:43:2f:1b:af:46:b2:84:4f Fingerprint (MD5): 14:A4:FD:03:A8:CD:C1:BE:CD:C2:44:F6:36:D9:B4:88 Fingerprint (SHA1): F2:64:64:FD:AC:87:DC:41:69:D6:E0:25:F6:67:7C:2E:E1:EE:2B:15 Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3319: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3320: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3321: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3322: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174308 (0x13710664) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:43:05 2012 Not After : Sun Mar 26 21:43:05 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:c0:18:e6:74:eb:5b:3f:9d:53:d4:d0:14:93:13:84: c7:bd:b7:15:f7:a3:ae:a9:42:06:15:e6:2d:ce:93:81: b4:0b:cf:90:6e:c6:f7:0b:8e:95:0b:0d:db:29:58:5e: 24:a6:77:5d:98:b0:e4:d2:3d:c2:f3:d0:12:79:77:43: ee:4d:b1:79:0b:f8:50:73:56:4f:3b:69:c0:41:bf:25: f3:8b:38:01:54:34:6e:b4:ea:88:57:67:01:3d:da:20: e3:84:da:aa:78:76:ac:03:9d:92:ae:e9:0d:77:13:ca: 7f:8b:ff:70:54:e9:04:47:5a:4e:15:24:e0:d1:e9:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3c:80:87:93:25:6d:9b:72:ce:02:ad:7f:97:e5:8c:d9: 48:66:51:75:07:36:a1:a0:b9:62:5f:67:38:51:6a:af: 4d:6a:70:1d:51:e8:b4:87:db:2b:f9:61:6d:62:4d:9d: b7:72:fb:9a:77:ed:0c:52:03:e8:83:4b:cc:13:09:77: ed:7b:c8:a1:eb:1f:26:5a:1a:b8:23:7b:45:25:61:4e: 1a:b8:9f:0e:8f:58:e5:01:08:d4:9f:95:84:a0:83:69: 08:39:76:9a:7c:60:a9:1d:f0:d0:c3:39:ec:2a:de:ab: 25:4b:53:b7:ff:85:1f:72:43:2f:1b:af:46:b2:84:4f Fingerprint (MD5): 14:A4:FD:03:A8:CD:C1:BE:CD:C2:44:F6:36:D9:B4:88 Fingerprint (SHA1): F2:64:64:FD:AC:87:DC:41:69:D6:E0:25:F6:67:7C:2E:E1:EE:2B:15 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3323: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3324: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3325: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3326: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174315 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3327: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3328: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3329: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3330: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174316 --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3331: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3332: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3333: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3334: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174317 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3335: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3336: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3337: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3338: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326174318 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3339: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #3340: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3341: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3342: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3343: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3344: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174315 (0x1371066b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:43:08 2012 Not After : Sun Mar 26 21:43:08 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:46:34:c3:65:6e:aa:67:bf:61:bc:74:a8:45:e8:03: 0c:64:07:f3:3a:21:ae:19:54:26:06:e8:51:84:97:94: 53:88:91:16:dd:4c:0a:89:4c:84:06:2c:c0:ff:ac:cc: 40:ae:6a:1b:49:d6:51:40:ea:05:fb:13:2a:26:e8:cd: a3:15:76:6b:36:80:35:07:e8:b6:b8:23:b9:0c:7e:31: 3c:3f:74:15:02:87:d1:d6:a5:f7:55:17:21:03:17:5c: cf:76:de:e7:f1:a5:29:20:8d:f9:37:98:10:80:e9:17: 1d:9a:dc:1a:7a:ee:0b:12:68:6f:07:55:08:6c:af:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1d:55:46:21:68:26:ce:a9:fc:12:57:e7:24:15:f6:ac: b6:67:2c:f9:d2:b1:0f:ce:ac:e7:3a:a7:bf:2b:44:f8: 51:80:da:cd:88:a7:3a:44:4c:68:5c:9b:31:bf:a5:cb: e9:ed:0d:ee:00:ee:91:d8:4f:b5:d5:c5:dc:7d:50:02: a2:77:78:12:d6:d9:ab:1c:98:c5:b1:81:27:2f:97:ab: 28:e4:ee:65:5b:be:96:d2:c9:fc:c6:5e:26:b7:c7:26: 8a:35:1b:f5:3e:a0:78:79:f2:1a:33:0b:19:87:90:44: bb:15:1e:13:85:6f:7a:a9:9b:6a:10:b7:a7:bf:a2:9c Fingerprint (MD5): 5F:2E:AA:EE:0C:57:C9:34:D7:14:EE:88:9F:30:5C:C0 Fingerprint (SHA1): 85:18:B0:72:0A:15:AF:EA:19:12:08:F6:C3:00:6C:2A:62:EB:08:F9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3345: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3346: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3347: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174316 (0x1371066c) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:43:09 2012 Not After : Sun Mar 26 21:43:09 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:26:36:aa:fb:84:a7:1b:fa:51:49:87:50:e0:51:25: a4:3b:2a:e8:9a:64:d5:b6:52:3d:46:84:36:84:71:a6: 65:42:a0:d9:86:ff:70:33:42:83:5c:41:0d:46:9d:b7: 7f:41:cb:f5:06:e1:53:50:cf:f4:90:ad:3e:97:c2:dc: 37:36:08:a1:91:52:55:5d:a8:b4:83:12:99:c6:f4:fb: de:26:63:29:44:f3:dd:b2:88:b4:e7:b0:a8:d2:2d:e5: 91:92:a4:da:eb:fb:a0:0e:4d:44:20:35:31:07:b7:f7: 2f:3f:66:43:1b:bf:57:18:65:b8:3e:01:8c:89:d9:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: bd:40:04:39:ee:d2:49:6d:b9:ec:c4:87:de:a0:a0:ba: 7b:10:50:25:85:20:76:12:74:ea:3c:d3:ab:7d:a1:ee: 34:e0:f6:b4:75:57:49:05:db:c7:e8:d1:4e:f4:94:c8: a2:e8:0d:10:16:02:c2:ad:8b:1d:c3:6d:04:dc:99:56: f7:77:75:25:b0:f0:07:49:70:2e:34:f1:a3:ec:65:eb: d6:0e:03:eb:63:8d:f4:4b:3c:51:2f:ed:d9:c0:12:7f: 1b:b4:90:02:cb:7e:a9:af:d6:93:87:8f:5d:d5:8a:2d: 3a:dc:2e:2d:56:61:e7:78:31:6b:8d:f8:91:24:95:35 Fingerprint (MD5): 63:B0:A4:4E:FF:59:56:D7:73:9F:38:1B:43:D3:53:8E Fingerprint (SHA1): 70:DE:27:A4:6C:C5:03:C5:AA:30:E1:6D:F3:D3:29:5E:1D:4C:F0:17 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3348: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3349: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174317 (0x1371066d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:43:09 2012 Not After : Sun Mar 26 21:43:09 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:1c:77:c9:64:94:2f:68:9f:50:50:a4:1d:0c:af:b7: 48:ec:90:91:d7:d9:cb:1d:94:78:a7:a8:a6:2f:48:ca: 85:5b:c7:65:48:22:2e:64:cc:89:ff:16:e3:9c:9c:5d: 1c:9f:f8:fa:f7:6b:d5:5e:2e:ad:55:70:6a:3f:4c:23: 29:09:f5:d0:1f:8e:88:5b:59:1f:f8:7c:a6:59:f2:99: e9:37:2e:e4:37:a3:ba:b1:e8:b4:14:ac:30:f5:4e:14: cd:5a:19:bb:b7:21:14:f5:c0:14:55:6c:7b:5e:21:7d: b5:58:fd:d1:57:69:f0:36:63:90:c9:8c:3c:95:d4:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c4:d4:c9:ce:8e:d2:e8:60:8d:89:b6:9e:41:cb:4f:87: a9:98:18:2f:0d:16:b2:23:63:8e:bf:01:cc:14:97:3a: e1:ed:1c:9a:61:7b:a5:af:95:d3:c4:b5:73:18:fe:f7: ed:ac:61:09:42:75:02:c2:9b:38:6a:69:1d:ae:10:dc: 38:ea:ec:79:40:7c:66:3d:e2:55:09:94:85:d9:e9:5a: af:49:2a:ef:e7:bb:2b:02:52:9a:80:67:42:7f:fd:a7: a2:5a:e9:68:35:1f:dc:9f:fd:18:38:c9:ac:70:79:73: 19:74:89:5c:45:37:24:b5:32:c9:ce:d2:29:80:72:48 Fingerprint (MD5): FB:76:86:AD:48:A2:3C:A4:B0:CB:1A:BD:C1:CF:93:35 Fingerprint (SHA1): DD:02:9F:43:7A:44:A5:F2:19:7F:49:B9:6A:51:68:F5:27:98:37:AC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3350: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3351: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174319 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3352: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3353: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3354: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3355: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174320 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3356: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3357: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3358: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3359: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174321 --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3360: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3361: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3362: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3363: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 326174322 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3364: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der chains.sh: #3365: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3366: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3367: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 326174323 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3368: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der chains.sh: #3369: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3370: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3371: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3372: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3373: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #3374: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174319 (0x1371066f) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:43:11 2012 Not After : Sun Mar 26 21:43:11 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:83:d4:bd:7b:0a:64:a1:d9:d3:49:75:f0:56:75:e4: f6:9d:4e:4d:ba:1c:8f:50:c9:c9:c8:56:a2:9b:04:f9: 78:47:b6:1b:16:ed:d0:f2:ba:44:56:a2:5d:1f:a5:b9: fa:4d:ee:b4:b0:2c:43:1b:e5:27:c4:c4:24:e3:46:96: 83:35:ff:3c:14:97:8f:f4:54:0f:7c:90:6a:ba:d8:47: 1a:12:ae:c9:6b:03:35:cd:ca:a4:fe:47:03:9f:ca:f4: 84:e4:17:59:f4:cc:0b:58:d2:f0:70:0a:71:96:ed:a7: 1f:dc:b2:b8:95:c3:02:ed:30:e2:8c:c3:cb:1f:57:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3b:39:03:ff:4f:24:c4:32:36:04:29:0b:07:2c:25:14: 87:09:13:f7:01:e8:da:50:12:41:a5:a6:80:43:51:67: 73:c1:32:d0:fb:ec:21:7b:d6:5e:df:19:be:68:54:00: 91:b4:d2:eb:cd:65:17:b2:84:69:2f:e2:3e:f8:e7:db: 12:72:67:91:19:65:ef:1a:fc:43:cb:ea:b8:7b:65:2f: 6f:b9:7f:a0:5a:0b:e0:3e:25:25:ad:e3:56:58:89:82: bf:73:5d:70:56:28:c1:2d:98:80:c6:95:cd:44:14:c6: d9:19:1e:8a:0b:54:b6:89:cb:57:3e:83:78:35:62:dc Fingerprint (MD5): C3:A7:ED:AB:26:F6:0C:75:0C:41:FF:1C:DC:4D:60:BC Fingerprint (SHA1): C3:AA:94:0E:83:B7:AE:82:C2:CC:A1:FD:40:EA:39:B7:2E:32:54:B2 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3375: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3376: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174320 (0x13710670) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:43:12 2012 Not After : Sun Mar 26 21:43:12 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:8f:95:0a:89:83:46:4d:6d:7b:56:8e:f8:6c:d5:aa: 1c:45:b1:a0:2e:5a:04:ff:ea:66:e6:28:3c:40:63:0d: 86:be:6c:8f:bd:2c:15:d4:2b:5b:19:19:f2:dd:e9:bd: 31:4d:f4:ba:c3:f7:07:93:33:9a:d2:d5:45:da:0e:f1: 2f:fe:27:ed:fc:6f:1d:b8:a7:be:be:a6:7f:dc:e1:fb: fa:a7:d2:fa:b7:ef:e0:0e:4d:ec:bf:3b:9b:77:2a:fd: 54:43:3a:1c:10:bc:41:f1:1b:f5:fe:34:00:17:5e:ac: 9e:85:73:35:39:27:4c:15:a2:9a:a4:de:6c:cf:e6:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 58:5c:c0:e1:f9:97:1e:dd:81:40:4c:a2:39:c4:cc:b9: 3b:f6:3d:95:bf:51:d9:ad:a0:c2:9f:91:ae:6a:22:aa: 88:c0:be:71:f3:51:ac:e5:41:92:ad:c4:c8:5b:57:cd: 6b:98:86:93:74:01:8d:4f:54:94:ed:67:9d:ff:0a:f7: 2c:97:cf:fc:2d:f1:88:11:0c:9b:fb:06:05:90:36:f0: f8:fe:b4:f0:d1:41:72:d0:e2:f8:8c:40:f2:61:0d:6c: 1b:1c:1c:e7:67:24:b3:10:73:1c:8a:a8:58:6c:e4:4a: 19:d0:11:12:e5:f1:48:52:98:e0:ca:f5:d2:19:a5:2a Fingerprint (MD5): 88:44:60:32:29:C3:BD:68:38:F0:24:2D:18:2B:ED:23 Fingerprint (SHA1): 09:55:EA:F8:24:C6:52:5D:FA:C6:B3:7C:D2:0C:C3:46:10:0B:23:66 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3377: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3378: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3379: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174321 (0x13710671) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:43:12 2012 Not After : Sun Mar 26 21:43:12 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:24:f0:35:3f:cd:42:9b:30:b7:9d:a0:c8:78:df:9a: 64:0d:d1:11:c8:d8:98:ca:d8:3f:26:e5:a4:cb:c6:a7: ca:73:e9:8f:c3:ea:5a:82:72:3c:f8:5c:87:98:20:19: 99:f5:02:3d:4e:4f:33:16:bd:4e:e7:32:42:f8:20:45: cf:a1:38:a9:a4:94:5b:72:fc:bb:49:c7:e1:fe:8a:28: ae:b5:2d:46:f6:e0:eb:fd:d4:68:c9:99:19:4d:ad:f5: b6:a9:67:6b:71:70:bc:c6:cc:33:99:83:03:fa:d5:1a: 82:df:89:0f:0b:59:d6:5f:48:15:11:12:25:99:3c:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8d:14:2f:f3:11:ad:f1:f5:80:0b:a9:ae:47:e2:e1:c4: 74:88:19:01:e7:51:5c:c3:2a:01:0d:d8:0e:b3:4f:00: 5f:0d:a6:92:44:18:eb:18:51:3d:f0:85:31:5a:2b:92: e8:70:2a:d7:28:2a:64:ee:ef:50:ea:72:01:08:23:10: cc:29:f3:99:3c:85:b8:9f:1e:a2:12:97:62:88:05:cc: 13:3b:89:df:f5:61:84:44:d1:ee:02:f3:b5:e9:74:ed: 42:c3:79:8b:2b:90:eb:e4:8b:0c:5a:03:03:7a:a2:99: 44:63:b1:0c:9c:bf:1f:c0:08:17:39:05:e7:5d:d4:39 Fingerprint (MD5): 27:8F:39:9B:68:C1:54:66:A6:80:E1:48:DC:26:D9:B2 Fingerprint (SHA1): 09:0A:DC:2E:01:28:C4:8D:D9:AE:BD:38:81:D0:99:7C:58:43:7C:7A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3380: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3381: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174324 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3382: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3383: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3384: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3385: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174325 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3386: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3387: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3388: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3389: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174326 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-30287-CA1Root-326174234.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3390: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3391: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3392: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3393: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326174327 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3394: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #3395: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #3396: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3397: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174328 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3398: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3399: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3400: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174329 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3401: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3402: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3403: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3404: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326174330 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3405: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #3406: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326174331 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3407: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #3408: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3409: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3410: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3411: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326174332 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-30287-Bridge-326174235.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3412: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #3413: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3414: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3415: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174333 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3416: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #3417: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3418: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3419: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174334 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3420: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3421: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3422: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174335 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3423: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3424: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3425: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3426: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326174336 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3427: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #3428: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326174337 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3429: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #3430: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3431: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3432: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3433: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326174338 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-30287-Bridge-326174236.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3434: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #3435: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3436: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3437: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174339 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3438: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #3439: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3440: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3441: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 326174340 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-30287-BridgeNavy-326174237.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3442: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #3443: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3444: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3445: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326174341 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3446: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #3447: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3448: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3449: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174342 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3450: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3451: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3452: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174343 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3453: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3454: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #3455: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3456: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 326174344 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3457: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der chains.sh: #3458: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #3459: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3460: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 326174345 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3461: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der chains.sh: #3462: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3463: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3464: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 326174346 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3465: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der chains.sh: #3466: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 326174347 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3467: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der chains.sh: #3468: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #3469: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3470: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3471: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326174348 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3472: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #3473: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3474: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3475: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 326174349 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3476: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #3477: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3478: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3479: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174350 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3480: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #3481: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3482: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3483: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326174351 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3484: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #3485: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3486: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174342 (0x13710686) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:43:22 2012 Not After : Sun Mar 26 21:43:22 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:b8:a9:5a:54:b4:c1:89:8b:2b:f8:2c:b7:03:50:f7: 7c:46:07:da:b3:cd:f9:9a:30:b9:2b:7a:e1:84:6e:92: 72:f1:90:81:5d:a3:dd:5d:8b:00:8f:77:14:5a:5e:18: e7:08:20:d7:d0:05:46:e3:24:d6:7f:14:c2:67:ee:85: 3e:a2:0b:45:93:d1:94:ef:e7:06:6b:f9:f6:33:b2:04: 68:52:5b:52:3c:eb:08:d0:45:99:a9:ce:af:e4:68:63: 83:71:94:b8:b2:9f:75:0c:2e:76:bd:60:11:6a:2b:dd: b5:b8:5e:2b:d7:97:0a:ae:cc:21:59:8f:8e:2f:14:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a6:87:bd:92:ea:51:e5:75:f4:9f:69:19:fa:f1:c2:8c: f0:2c:93:70:e9:4d:ed:da:c1:58:ad:60:fb:da:49:2f: ec:12:f2:cf:74:b6:87:c4:ff:6d:e2:6a:48:c3:ce:80: 4f:3a:f7:78:34:f8:a9:0f:f5:c0:d0:31:7a:51:a1:b6: b6:af:64:6a:b4:5b:92:e8:4e:eb:98:06:62:99:88:65: 5c:64:83:9a:05:e7:d3:d5:60:b6:7e:66:e3:d0:7a:fe: d1:bf:13:2e:9b:53:af:33:da:d5:43:6e:6a:b7:2e:16: b4:48:58:3a:15:66:a6:56:3a:53:12:a8:65:b1:91:58 Fingerprint (MD5): 20:CD:2E:69:3C:DB:E9:EC:CA:37:4D:C1:FA:04:2F:87 Fingerprint (SHA1): 56:F1:73:00:3D:D6:29:9D:C3:6A:32:47:16:C5:90:06:75:49:A4:FD Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #3487: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3488: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3489: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3490: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3491: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3492: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3493: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3494: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3495: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174343 (0x13710687) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:43:23 2012 Not After : Sun Mar 26 21:43:23 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:9a:0e:3b:46:fa:53:fd:42:28:26:e3:23:28:ce:de: d5:b0:1c:24:5c:0c:09:9d:69:76:ed:c8:c9:ca:8a:9e: b1:ac:5a:80:25:ce:6a:e4:e1:0d:30:6f:54:7d:0b:40: c6:d7:b2:6b:f8:39:0a:94:1e:17:05:9f:66:55:00:1a: 7d:7a:4a:2e:e4:f8:4e:19:7a:13:93:01:f4:d8:07:ec: f5:63:23:bf:6f:55:ed:0a:fb:71:db:5b:fb:19:84:95: 13:03:70:cd:8e:11:55:1c:21:f6:e4:d4:bc:d3:e0:36: 1b:be:0e:a9:48:25:1b:b0:c0:ec:ae:4c:ef:1c:92:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 4e:9b:b9:8d:f7:00:f5:4d:d8:de:ad:5c:09:50:dc:90: 60:71:25:bd:6a:6e:ad:5c:59:91:8b:7c:7b:f8:5c:4c: 7e:2f:9a:9b:c4:b2:7f:54:13:0b:e8:59:7f:80:c0:a3: f5:ad:2a:85:5a:56:f2:7e:bd:b9:49:d8:ec:52:11:72: 8b:39:04:44:b6:b9:5b:a2:c6:6e:4b:d3:6f:63:66:33: 04:b5:81:73:54:a1:39:dc:21:8a:e6:ca:5f:d2:f6:fd: 1c:90:83:e6:2a:e0:9e:c2:c6:43:3c:f2:50:0a:96:b8: db:ec:13:0a:71:26:05:55:e0:fb:c8:56:93:7c:65:9f Fingerprint (MD5): E0:C8:62:05:AA:6A:E4:CD:51:FD:A5:04:15:15:6A:26 Fingerprint (SHA1): 14:9F:70:88:BF:3C:D7:35:B0:F0:1D:05:AF:2A:79:C5:05:BC:3E:6E Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #3496: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3497: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3498: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3499: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3500: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3501: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3502: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #3503: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #3504: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #3505: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #3506: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #3507: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #3508: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #3509: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #3510: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #3511: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.113733.1.7.23.6 /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig n, Inc.",C=US" Validity: Not Before: Wed Nov 08 00:00:00 2006 Not After : Sun Nov 07 23:59:59 2021 Subject: "CN=VeriSign Class 3 Public Primary Certification Authority - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve riSign Trust Network,O="VeriSign, Inc.",C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc: 7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64: 85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42: b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec: ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3: 62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b: 9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f: e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db: 7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af: 1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a: b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7: ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74: 24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4: 8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95: ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f: 73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: CRL Distribution Points Distribution point: URI: "http://crl.verisign.com/pca3.crl" Name: Certificate Key Usage Critical: True Usages: Certificate Signing CRL Signing Name: OID.1.3.6.1.5.5.7.1.12 Data: Sequence { [1]: { [0]: { Sequence { Sequence { Sequence { "image/gif" Sequence { Sequence { Sequence { SHA-1 } 8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf: 80:6a:d4:48:18:2c:7b:19:2e } } Sequence { "http://logo.verisign.com/vslogo.gif" } } } } } } } Name: Certificate Policies Data: Policy Name: Certificate Policies AnyPolicy Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Qualifier Data: "https://www.verisign.com/cps" Name: Certificate Subject Key ID Data: 7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02: af:33:31:33 Name: Certificate Authority Key Identifier Issuer: Directory Name: "OU=Class 3 Public Primary Certification Auth ority,O="VeriSign, Inc.",C=US" Serial Number: 70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a: f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31: 47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c: d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0: ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d: 5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a: 84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1: d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6 Fingerprint (MD5): C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C Fingerprint (SHA1): 87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C= US,serialNumber=3014267,businessCategory=Private Organization,incorporati onState=Delaware,incorporationCountry=US" Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network ,O="VeriSign, Inc.",C=US" Returned value is 0, expected result is pass chains.sh: #3512: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #3513: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3514: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174352 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3515: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3516: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3517: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3518: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174353 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3519: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3520: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3521: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3522: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174354 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3523: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #3524: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3525: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3526: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 326174355 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3527: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der chains.sh: #3528: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3529: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3530: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326174356 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3531: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #3532: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3533: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3534: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 326174357 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3535: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der chains.sh: #3536: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #3537: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3538: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 326174358 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3539: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der chains.sh: #3540: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #3541: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3542: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 326174359 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3543: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der chains.sh: #3544: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #3545: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3546: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 326174360 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3547: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der chains.sh: #3548: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3549: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174352 (0x13710690) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:43:28 2012 Not After : Sun Mar 26 21:43:28 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 8f:9c:4a:45:f9:c1:b9:8f:f3:c8:6b:d9:1a:97:b6:55: 93:03:68:10:c4:96:04:d4:4e:d0:af:0c:2f:98:41:89: 0c:ea:a0:4f:bc:68:af:cc:b8:f0:f8:c7:f6:2d:4b:19: 35:d7:4e:c8:50:02:a8:64:9f:e7:a8:ec:70:26:17:24: 22:9d:9f:8e:ca:9f:41:79:60:f5:ca:51:c9:26:1a:2e: be:40:bd:e0:f3:fe:16:98:f9:4d:3d:c2:b2:7a:7c:20: 21:c4:53:c9:f8:1c:05:0e:cf:e6:e4:e4:30:52:bd:f4: 92:c5:59:9d:a3:0a:dc:f5:de:6f:b5:b0:0d:4b:6f:4c Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:14:6b:70:4a:a2:8b:2a:ab:df:98:8d:9b:a5: 87:73:67:36:8e:50:d8:cb:02:15:00:89:6d:72:d6:30: 8c:60:6a:21:ac:3a:0a:66:72:ab:41:99:74:73:2b Fingerprint (MD5): 22:EE:49:9D:84:F7:04:52:ED:2E:A4:41:6D:E0:5A:AB Fingerprint (SHA1): E2:96:70:E3:AD:93:4F:6E:8D:61:9A:19:C2:CB:6F:94:5F:8D:8A:D4 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3550: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174352 (0x13710690) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:43:28 2012 Not After : Sun Mar 26 21:43:28 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 8f:9c:4a:45:f9:c1:b9:8f:f3:c8:6b:d9:1a:97:b6:55: 93:03:68:10:c4:96:04:d4:4e:d0:af:0c:2f:98:41:89: 0c:ea:a0:4f:bc:68:af:cc:b8:f0:f8:c7:f6:2d:4b:19: 35:d7:4e:c8:50:02:a8:64:9f:e7:a8:ec:70:26:17:24: 22:9d:9f:8e:ca:9f:41:79:60:f5:ca:51:c9:26:1a:2e: be:40:bd:e0:f3:fe:16:98:f9:4d:3d:c2:b2:7a:7c:20: 21:c4:53:c9:f8:1c:05:0e:cf:e6:e4:e4:30:52:bd:f4: 92:c5:59:9d:a3:0a:dc:f5:de:6f:b5:b0:0d:4b:6f:4c Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:14:6b:70:4a:a2:8b:2a:ab:df:98:8d:9b:a5: 87:73:67:36:8e:50:d8:cb:02:15:00:89:6d:72:d6:30: 8c:60:6a:21:ac:3a:0a:66:72:ab:41:99:74:73:2b Fingerprint (MD5): 22:EE:49:9D:84:F7:04:52:ED:2E:A4:41:6D:E0:5A:AB Fingerprint (SHA1): E2:96:70:E3:AD:93:4F:6E:8D:61:9A:19:C2:CB:6F:94:5F:8D:8A:D4 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3551: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174352 (0x13710690) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:43:28 2012 Not After : Sun Mar 26 21:43:28 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 8f:9c:4a:45:f9:c1:b9:8f:f3:c8:6b:d9:1a:97:b6:55: 93:03:68:10:c4:96:04:d4:4e:d0:af:0c:2f:98:41:89: 0c:ea:a0:4f:bc:68:af:cc:b8:f0:f8:c7:f6:2d:4b:19: 35:d7:4e:c8:50:02:a8:64:9f:e7:a8:ec:70:26:17:24: 22:9d:9f:8e:ca:9f:41:79:60:f5:ca:51:c9:26:1a:2e: be:40:bd:e0:f3:fe:16:98:f9:4d:3d:c2:b2:7a:7c:20: 21:c4:53:c9:f8:1c:05:0e:cf:e6:e4:e4:30:52:bd:f4: 92:c5:59:9d:a3:0a:dc:f5:de:6f:b5:b0:0d:4b:6f:4c Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:14:6b:70:4a:a2:8b:2a:ab:df:98:8d:9b:a5: 87:73:67:36:8e:50:d8:cb:02:15:00:89:6d:72:d6:30: 8c:60:6a:21:ac:3a:0a:66:72:ab:41:99:74:73:2b Fingerprint (MD5): 22:EE:49:9D:84:F7:04:52:ED:2E:A4:41:6D:E0:5A:AB Fingerprint (SHA1): E2:96:70:E3:AD:93:4F:6E:8D:61:9A:19:C2:CB:6F:94:5F:8D:8A:D4 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3552: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174352 (0x13710690) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:43:28 2012 Not After : Sun Mar 26 21:43:28 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 8f:9c:4a:45:f9:c1:b9:8f:f3:c8:6b:d9:1a:97:b6:55: 93:03:68:10:c4:96:04:d4:4e:d0:af:0c:2f:98:41:89: 0c:ea:a0:4f:bc:68:af:cc:b8:f0:f8:c7:f6:2d:4b:19: 35:d7:4e:c8:50:02:a8:64:9f:e7:a8:ec:70:26:17:24: 22:9d:9f:8e:ca:9f:41:79:60:f5:ca:51:c9:26:1a:2e: be:40:bd:e0:f3:fe:16:98:f9:4d:3d:c2:b2:7a:7c:20: 21:c4:53:c9:f8:1c:05:0e:cf:e6:e4:e4:30:52:bd:f4: 92:c5:59:9d:a3:0a:dc:f5:de:6f:b5:b0:0d:4b:6f:4c Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:14:6b:70:4a:a2:8b:2a:ab:df:98:8d:9b:a5: 87:73:67:36:8e:50:d8:cb:02:15:00:89:6d:72:d6:30: 8c:60:6a:21:ac:3a:0a:66:72:ab:41:99:74:73:2b Fingerprint (MD5): 22:EE:49:9D:84:F7:04:52:ED:2E:A4:41:6D:E0:5A:AB Fingerprint (SHA1): E2:96:70:E3:AD:93:4F:6E:8D:61:9A:19:C2:CB:6F:94:5F:8D:8A:D4 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #3553: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3554: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3555: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3556: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #3557: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3558: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3559: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #3560: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3561: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3562: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3563: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #3564: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #3565: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3566: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3567: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #3568: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #3569: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3570: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3571: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der chains.sh: #3572: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3573: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3574: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3575: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #3576: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #3577: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3578: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3579: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #3580: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20120326214334Z nextupdate=20130326214334Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 26 21:43:34 2012 Next Update: Tue Mar 26 21:43:34 2013 CRL Extensions: chains.sh: #3581: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214334Z nextupdate=20130326214334Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:43:34 2012 Next Update: Tue Mar 26 21:43:34 2013 CRL Extensions: chains.sh: #3582: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326214334Z nextupdate=20130326214334Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:43:34 2012 Next Update: Tue Mar 26 21:43:34 2013 CRL Extensions: chains.sh: #3583: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20120326214334Z nextupdate=20130326214334Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 26 21:43:34 2012 Next Update: Tue Mar 26 21:43:34 2013 CRL Extensions: chains.sh: #3584: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326214335Z addcert 14 20120326214335Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:43:35 2012 Next Update: Tue Mar 26 21:43:34 2013 Entry (1): Serial Number: 14 (0xe) Revocation Date: Mon Mar 26 21:43:35 2012 CRL Extensions: chains.sh: #3585: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214336Z addcert 15 20120326214336Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:43:36 2012 Next Update: Tue Mar 26 21:43:34 2013 Entry (1): Serial Number: 15 (0xf) Revocation Date: Mon Mar 26 21:43:36 2012 CRL Extensions: chains.sh: #3586: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3587: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3588: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #3589: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #3590: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #3591: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #3592: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #3593: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #3594: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #3595: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:43:30 2012 Not After : Sun Mar 26 21:43:30 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:65:ad:66:e2:26:02:88:08:08:b5:cc:1f:8d:b6:e6: 7e:f3:3f:51:06:d0:5a:63:6d:31:fb:b9:d3:6e:ce:a5: dd:79:a2:de:56:93:67:a9:f7:60:37:30:bf:41:d1:40: 07:81:42:d8:5e:7c:c3:ae:7e:08:a9:b2:f1:ec:22:26: 38:f0:c7:17:b8:0a:29:cf:07:98:30:21:61:8a:7a:6e: e2:7d:05:6a:fb:a1:da:bc:bb:c7:19:53:38:61:4e:e6: 09:a1:d2:14:16:83:4c:8c:59:05:2d:7c:5a:ed:23:11: 6b:57:c9:e6:5a:aa:b3:21:ad:30:82:37:44:50:4b:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 76:f8:f1:f5:6f:d8:80:d3:aa:a1:c5:55:91:84:86:c9: da:46:37:1b:7d:18:04:e1:dc:a5:16:b7:da:0d:94:49: 38:08:fc:43:e2:2e:cd:4b:ae:91:f4:3d:06:55:79:3c: 16:c2:8f:0d:4a:90:76:17:54:6f:8a:12:d4:bc:88:18: 69:b0:e5:21:f5:ec:18:36:4f:93:bc:56:94:be:57:05: eb:2d:66:b1:82:3f:a9:e8:89:58:ff:b8:f5:67:e6:72: 3c:91:e6:2c:e3:52:3c:cd:16:df:1d:2b:0e:6b:45:d9: 31:f7:ed:c6:3e:c0:aa:3c:9d:0c:4b:d3:1f:93:38:3e Fingerprint (MD5): C4:C6:13:75:8B:F8:F2:66:45:44:D5:2E:91:4B:6B:CE Fingerprint (SHA1): 26:94:C3:D4:C2:E3:E8:97:32:E1:EC:CA:56:72:D1:61:99:D5:44:D2 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3596: Revocation: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3597: Revocation: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:43:30 2012 Not After : Sun Mar 26 21:43:30 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:65:ad:66:e2:26:02:88:08:08:b5:cc:1f:8d:b6:e6: 7e:f3:3f:51:06:d0:5a:63:6d:31:fb:b9:d3:6e:ce:a5: dd:79:a2:de:56:93:67:a9:f7:60:37:30:bf:41:d1:40: 07:81:42:d8:5e:7c:c3:ae:7e:08:a9:b2:f1:ec:22:26: 38:f0:c7:17:b8:0a:29:cf:07:98:30:21:61:8a:7a:6e: e2:7d:05:6a:fb:a1:da:bc:bb:c7:19:53:38:61:4e:e6: 09:a1:d2:14:16:83:4c:8c:59:05:2d:7c:5a:ed:23:11: 6b:57:c9:e6:5a:aa:b3:21:ad:30:82:37:44:50:4b:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 76:f8:f1:f5:6f:d8:80:d3:aa:a1:c5:55:91:84:86:c9: da:46:37:1b:7d:18:04:e1:dc:a5:16:b7:da:0d:94:49: 38:08:fc:43:e2:2e:cd:4b:ae:91:f4:3d:06:55:79:3c: 16:c2:8f:0d:4a:90:76:17:54:6f:8a:12:d4:bc:88:18: 69:b0:e5:21:f5:ec:18:36:4f:93:bc:56:94:be:57:05: eb:2d:66:b1:82:3f:a9:e8:89:58:ff:b8:f5:67:e6:72: 3c:91:e6:2c:e3:52:3c:cd:16:df:1d:2b:0e:6b:45:d9: 31:f7:ed:c6:3e:c0:aa:3c:9d:0c:4b:d3:1f:93:38:3e Fingerprint (MD5): C4:C6:13:75:8B:F8:F2:66:45:44:D5:2E:91:4B:6B:CE Fingerprint (SHA1): 26:94:C3:D4:C2:E3:E8:97:32:E1:EC:CA:56:72:D1:61:99:D5:44:D2 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3598: Revocation: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3599: Revocation: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED ./chains.sh: line 806: ping: command not found OCSP server not accessible, skipping OCSP tests chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3600: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 326174361 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3601: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3602: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #3603: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3604: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 326174362 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3605: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #3606: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3607: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 /localhost-30287-CA0-326174251.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3608: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-30287-CA0Root-326174238.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3609: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #3610: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #3611: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-30287-CA0-326174251.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3612: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 326174363 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3613: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #3614: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3615: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 /localhost-30287-CA0-326174251.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3616: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-30287-CA0Root-326174239.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3617: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #3618: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #3619: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3620: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 326174364 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3621: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #3622: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3623: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-30287-CA0-326174251.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3624: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-30287-CA0Root-326174240.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3625: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der chains.sh: #3626: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3627: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-30287-CA0-326174251.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3628: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-30287-CA0Root-326174241.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3629: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der chains.sh: #3630: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20120326214339Z nextupdate=20130326214339Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 26 21:43:39 2012 Next Update: Tue Mar 26 21:43:39 2013 CRL Extensions: chains.sh: #3631: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214339Z nextupdate=20130326214339Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:43:39 2012 Next Update: Tue Mar 26 21:43:39 2013 CRL Extensions: chains.sh: #3632: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326214339Z nextupdate=20130326214339Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:43:39 2012 Next Update: Tue Mar 26 21:43:39 2013 CRL Extensions: chains.sh: #3633: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20120326214339Z nextupdate=20130326214339Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 26 21:43:39 2012 Next Update: Tue Mar 26 21:43:39 2013 CRL Extensions: chains.sh: #3634: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214340Z addcert 20 20120326214340Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:43:40 2012 Next Update: Tue Mar 26 21:43:39 2013 Entry (1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 26 21:43:40 2012 CRL Extensions: chains.sh: #3635: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326214341Z addcert 40 20120326214341Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:43:41 2012 Next Update: Tue Mar 26 21:43:39 2013 Entry (1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 26 21:43:40 2012 Entry (2): Serial Number: 40 (0x28) Revocation Date: Mon Mar 26 21:43:41 2012 CRL Extensions: chains.sh: #3636: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3637: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3638: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #3639: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined TIMESTAMP chains END: Mon Mar 26 17:43:42 EDT 2012 chains.sh: Testing with upgraded library =============================== cp: cannot stat `/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/eccurves': No such file or directory cp: cannot stat `/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/cert.done': No such file or directory Running tests for dbupgrade TIMESTAMP dbupgrade BEGIN: Mon Mar 26 17:43:42 EDT 2012 dbupgrade.sh: DB upgrade tests =============================== Reset databases to their initial values: certutil: could not find certificate named "objsigner": security library: bad database. Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu dbupgrade.sh: Legacy to shared Library update =============================== alicedir upgrading db alicedir Generating key. This may take a few moments... dbupgrade.sh: #3640: Upgrading alicedir - PASSED bobdir upgrading db bobdir Generating key. This may take a few moments... dbupgrade.sh: #3641: Upgrading bobdir - PASSED CA upgrading db CA Generating key. This may take a few moments... dbupgrade.sh: #3642: Upgrading CA - PASSED cert_extensions upgrading db cert_extensions Generating key. This may take a few moments... dbupgrade.sh: #3643: Upgrading cert_extensions - PASSED client upgrading db client Generating key. This may take a few moments... dbupgrade.sh: #3644: Upgrading client - PASSED clientCA upgrading db clientCA Generating key. This may take a few moments... dbupgrade.sh: #3645: Upgrading clientCA - PASSED dave upgrading db dave Generating key. This may take a few moments... dbupgrade.sh: #3646: Upgrading dave - PASSED eccurves skipping db eccurves dbupgrade.sh: #3647: No directory eccurves - PASSED eve upgrading db eve Generating key. This may take a few moments... dbupgrade.sh: #3648: Upgrading eve - PASSED ext_client upgrading db ext_client Generating key. This may take a few moments... dbupgrade.sh: #3649: Upgrading ext_client - PASSED ext_server upgrading db ext_server Generating key. This may take a few moments... dbupgrade.sh: #3650: Upgrading ext_server - PASSED SDR upgrading db SDR Generating key. This may take a few moments... dbupgrade.sh: #3651: Upgrading SDR - PASSED server upgrading db server Generating key. This may take a few moments... dbupgrade.sh: #3652: Upgrading server - PASSED serverCA upgrading db serverCA Generating key. This may take a few moments... dbupgrade.sh: #3653: Upgrading serverCA - PASSED tools/copydir skipping db tools/copydir dbupgrade.sh: #3654: No directory tools/copydir - PASSED upgrading db fips Generating key. This may take a few moments... dbupgrade.sh: #3655: Upgrading fips - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu TIMESTAMP dbupgrade END: Mon Mar 26 17:43:59 EDT 2012 Running tests for tools TIMESTAMP tools BEGIN: Mon Mar 26 17:43:59 EDT 2012 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3656: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 62:42:3b:91:7d:18:4b:8b:cd:2a:54:6b:d4:43:05:6f Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3657: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3658: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3659: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 32:10:bc:d1:70:68:53:42:2b:35:f8:b5:8c:d2:0c:76 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3660: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3661: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3662: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 26:a3:d4:02:2c:dc:6d:86:61:b9:3d:ce:83:47:b5:41 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3663: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3664: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3665: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 29:57:87:16:02:3a:a7:6f:e5:67:22:9f:10:b3:a2:2c Iteration Count: 1 (0x1) tools.sh: #3666: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3667: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3668: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 33:e5:1e:10:21:ad:96:89:63:8c:18:e4:6e:9a:f7:37 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3669: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3670: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3671: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 99:97:14:e6:81:0f:1a:c9:ff:49:e5:ac:6b:dc:de:ce Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3672: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3673: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3674: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8a:c1:b7:01:cc:ac:b6:b7:84:b0:93:af:09:08:ae:56 Iteration Count: 1 (0x1) tools.sh: #3675: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3676: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3677: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fb:c8:2d:4b:45:eb:6b:f4:8e:07:5e:f5:6d:a3:5b:26 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:80:a6:59:01:6f:0f:af:d6:67:b2:73:16:26:da: 2d:88 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3678: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3679: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3680: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 50:34:ba:2b:05:ad:d2:c7:03:f3:41:79:71:6e:17:85 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:ff:e7:36:4b:9b:e8:80:86:37:10:01:9c:59:a0: 68:f3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3681: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3682: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3683: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a4:a9:7d:91:a5:8d:4e:e5:cf:d4:1c:f8:1b:4d:1e:de Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:26:3d:5a:0f:06:2a:18:be:d8:14:f5:22:18:a7: f2:e4 tools.sh: #3684: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3685: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3686: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c9:39:64:56:d5:53:60:58:0e:55:42:d0:7c:e4:b2:5a Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:42:45:f9:0d:33:eb:64:15:67:4f:b2:ae:29:76: 9a:1e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3687: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3688: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3689: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8f:db:57:a3:23:08:b0:73:04:81:5a:3f:57:24:03:08 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:32:ff:a9:49:bf:d1:ac:d3:79:fc:ac:b2:fe:b8: 93:0c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3690: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3691: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3692: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0a:49:fe:93:2c:d6:31:c9:3d:f2:ea:1c:2d:ed:a4:c1 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:ae:b9:6a:4d:36:84:0f:48:07:71:75:a1:b7:c6: ae:8b tools.sh: #3693: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3694: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3695: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 58:88:fb:15:30:f6:2b:38:f7:ab:f7:0e:c4:22:a7:15 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ac:a1:df:c1:7f:0f:14:42:68:84:8f:71:e4:45: ba:2e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3696: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3697: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3698: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ff:45:84:c5:f1:c1:9f:7c:29:cf:53:50:da:22:66:9d Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ac:d5:ca:e9:e4:59:55:8a:5e:ba:cc:96:0f:f0: e8:ad Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3699: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3700: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3701: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 74:67:e0:7b:bc:6c:62:e6:e5:28:6c:90:c1:48:92:dd Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:cc:c5:34:1a:38:c9:d6:c7:8e:34:30:40:5c:90: e3:63 tools.sh: #3702: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3703: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3704: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f7:50:91:e2:62:05:6d:32:c4:df:2f:92:ef:94:8d:1a Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:ff:24:41:81:e9:1b:4d:c6:24:02:69:32:89:34: 3f:93 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3705: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3706: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3707: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ad:ab:b2:9c:ff:03:5e:0f:c6:c0:37:f2:c9:db:b1:4e Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:2e:5b:31:fb:f9:9c:e9:a8:ab:9d:9f:14:c4:2b: 04:17 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3708: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3709: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3710: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 50:ba:65:1e:b4:b5:a5:b5:73:14:dc:f6:90:81:dc:0b Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:fb:70:bc:e0:c3:67:6c:ef:74:cd:0e:3b:42:16: 6f:50 tools.sh: #3711: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3712: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3713: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7d:f5:98:41:8d:b7:0d:8b:59:42:de:a6:d7:fc:5b:74 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:72:a1:87:78:51:f0:fc:99:1c:e2:9d:ea:67:d3: df:a5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3714: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3715: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3716: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 83:2b:5d:1e:d7:31:a5:5f:e7:03:e8:99:4c:88:d9:b6 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:ea:6d:8e:f0:83:90:e7:7f:0d:4d:bc:61:28:22: 5a:c6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3717: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3718: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3719: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 59:4d:20:9a:18:80:32:f8:f8:04:50:81:46:71:f8:59 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:ed:b4:a9:a2:7f:ca:b6:16:44:3f:2a:2b:d2:80: a3:34 tools.sh: #3720: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3721: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3722: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9a:df:7a:21:87:ae:e4:9c:87:eb:dc:f5:e7:f8:f0:b2 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:28:05:97:6e:fd:b5:38:60:0b:15:f9:c7:06:a7: b1:46 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3723: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3724: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3725: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6c:3a:4e:01:97:ee:b2:cc:ba:7d:46:fb:61:a7:80:b9 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:73:e2:d6:6f:34:6f:76:47:b2:3a:0b:80:af:99: af:91 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3726: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3727: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3728: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 46:f0:99:09:2f:ce:7b:08:11:03:b4:40:c4:11:dc:07 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:ef:f4:78:2b:14:2f:e4:bf:64:c1:c9:2e:ae:21: 6c:15 tools.sh: #3729: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3730: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3731: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 27:32:19:9c:dd:e3:ef:a9:73:be:07:90:3e:66:b9:80 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3732: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3733: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3734: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 8b:a0:b8:a4:65:d7:39:76:46:77:5c:06:23:ef:82:13 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3735: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3736: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3737: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 4d:db:00:24:9a:32:92:0b:d6:8c:77:98:55:70:7d:c4 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3738: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3739: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3740: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: cf:f9:d7:18:7b:90:42:14:93:d1:2e:81:be:8f:6a:6a Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3741: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3742: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3743: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 08:45:6c:74:bf:00:76:7f:d1:e6:c0:1c:bf:de:4b:c3 Iteration Count: 1 (0x1) tools.sh: #3744: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3745: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3746: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 14:23:35:dc:2c:36:3f:5c:dd:55:bf:31:5c:a8:b9:8c Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3747: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3748: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3749: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: dd:d5:41:49:2b:99:b3:b3:c0:97:c2:6f:94:58:a5:e2 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3750: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3751: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3752: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: ad:b0:0d:d6:d8:25:29:c7:98:b5:53:3b:d5:0f:af:70 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3753: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3754: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3755: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 36:10:42:c0:b1:de:f9:08:a8:37:2b:1c:7a:0a:50:8d Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3756: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3757: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3758: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: b7:48:05:f7:d2:1c:f7:f4:3b:8f:7c:cf:df:6b:48:bc Iteration Count: 1 (0x1) tools.sh: #3759: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3760: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3761: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b6:e6:3e:49:bc:63:e2:f5:3a:a3:ed:af:54:fc:62:b7 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3762: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3763: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3764: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 5a:28:3c:87:b3:f0:55:b1:8f:c1:1e:13:1c:a3:5d:cb Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3765: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3766: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3767: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3d:55:df:4b:c3:65:1b:b9:da:cd:e2:8c:77:b0:af:8c Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3768: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3769: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3770: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a8:23:a2:1f:80:4b:c5:fe:97:2e:14:da:18:49:ec:da Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3771: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3772: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3773: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 9d:dc:91:5e:12:ee:7c:59:da:b5:fe:18:62:ae:86:d5 Iteration Count: 1 (0x1) tools.sh: #3774: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3775: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3776: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b8:9a:71:84:3b:50:72:b5:1b:1f:d7:98:10:b5:4f:2e Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3777: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3778: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3779: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 62:7d:1a:45:1b:2c:d0:eb:97:1e:07:67:74:91:a3:4f Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3780: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3781: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3782: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c8:9c:2e:1f:ed:65:bb:dd:4d:d5:2f:6b:c7:ff:6e:a6 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3783: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3784: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3785: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 02:88:02:8f:73:98:5e:cd:5a:f6:7c:86:11:26:14:b4 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3786: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3787: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3788: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 83:96:4b:38:93:de:03:64:4e:f6:85:00:13:b6:7c:95 Iteration Count: 1 (0x1) tools.sh: #3789: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3790: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3791: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a8:90:19:46:bb:24:13:b9:eb:a2:92:66:14:c1:1f:87 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3792: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3793: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3794: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 61:c8:97:4a:f7:ba:8e:d9:18:39:34:f4:d4:81:7c:5d Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3795: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3796: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3797: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a5:8b:09:18:7b:34:46:cf:df:e6:f6:11:95:95:d6:98 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3798: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3799: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3800: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c8:6f:84:4f:89:d5:76:66:eb:6d:ef:3f:26:9a:56:86 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3801: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3802: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3803: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 49:79:87:28:af:fc:5c:e3:13:89:e0:5d:d6:11:f6:df Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3804: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3805: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3806: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c4:a7:3f:76:ed:29:51:04:ef:09:6b:9a:e5:eb:6b:8f Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3807: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3808: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3809: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c8:c6:a2:a1:9c:9e:d7:76:48:b0:05:37:f9:eb:cc:51 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3810: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3811: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3812: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4c:e4:ec:c7:1b:17:62:8a:00:44:79:e0:41:c1:d7:ca Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3813: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3814: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3815: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a9:e4:00:a5:60:44:f6:c0:1c:89:1e:7e:b1:87:7a:c9 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3816: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3817: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3818: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 20:21:cd:2c:88:b1:6a:bc:6d:75:75:8e:9c:2a:0f:05 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:15 2012 Not After : Sun Mar 26 21:35:15 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:4a:bd:1b:52:ab:29:16:83:bd:15:6c:9d:82:51:f7: d5:51:4f:bc:c4:3a:e7:08:d6:f6:35:78:a0:2b:45:79: 3e:f5:a4:cb:2b:90:36:7d:4e:d9:ba:ba:e5:20:82:bf: 7c:98:63:46:c2:35:39:b3:fc:e7:d4:48:41:e7:70:1c: 73:dd:b6:4c:9c:c5:56:db:89:eb:9c:82:43:08:ed:2a: 4b:49:51:55:9f:e9:a9:4e:cb:01:fa:38:53:86:5b:ab: 89:80:8a:69:c2:03:0f:5d:52:88:96:a9:35:67:21:73: 58:19:59:b1:81:9d:8f:d9:07:f5:f9:1d:51:b7:ba:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7b:60:7e:4c:5a:17:9d:8f:65:75:20:49:e5:bb:40:0f: 60:33:1a:ae:42:49:3d:99:17:c5:42:75:83:28:60:53: da:0a:98:95:5f:f5:44:22:41:a9:f5:73:65:f4:a2:3a: 5d:c3:20:d9:20:75:65:e0:73:6b:01:23:45:34:68:a2: 6b:29:89:e1:30:46:d3:25:44:2f:2a:06:e9:c2:a6:43: a7:e6:c0:a0:91:7a:9e:ca:c5:32:d3:bf:ab:99:a5:18: 12:92:9f:a0:22:53:8b:b5:da:02:55:eb:73:85:d7:39: e7:03:06:bb:64:1f:ef:dd:f0:af:c1:be:1f:d2:4d:8f Fingerprint (MD5): C1:9D:FC:50:56:E9:7D:F3:7D:47:BD:C5:50:31:A5:9D Fingerprint (SHA1): 92:7C:9E:57:37:09:75:C9:E8:A1:3F:A0:4D:9A:8E:4B:3B:6E:0C:60 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:19 2012 Not After : Sun Mar 26 21:35:19 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:9e:30:34:d6:d3:95:38:86:3b:7f:3b:1a:a4:93:1e: 9b:7b:90:27:d9:6d:e8:16:ef:fc:10:69:7c:36:73:cc: c9:0c:1c:d7:4d:54:9f:ac:5c:98:e8:e8:6b:d2:52:86: 49:95:3d:4f:6d:aa:d6:1e:11:4b:cf:65:9f:bd:e3:a5: 3d:c0:d2:51:79:09:af:cf:c6:55:79:ae:08:a5:00:74: 64:30:6e:75:17:30:0f:62:b8:6d:0c:93:42:62:4b:6a: 7b:d1:ec:43:22:d6:d8:28:95:97:57:5c:be:ff:f6:ad: a8:04:8d:f3:4a:56:04:5e:41:d9:69:d0:42:dc:9b:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 44:ea:78:3b:5f:bc:5b:75:c7:68:24:e0:77:f0:3e:f4: b6:ad:eb:b6:3d:0e:64:23:f7:f5:64:3e:7f:85:f2:47: b3:19:fc:6b:36:0e:24:fd:78:30:b5:0f:68:29:73:ce: 74:bb:f5:55:06:c5:4a:58:91:85:b8:f7:41:39:6b:1e: ae:67:b2:78:70:a6:43:42:e8:49:7f:1b:65:f8:39:e7: b7:b3:0e:2f:5f:8c:cb:f8:48:ab:26:f0:7f:27:20:70: 82:29:69:df:b7:28:ff:5c:4d:d7:6c:38:7d:c5:5e:9d: 28:0d:db:5e:d3:8e:3a:63:f6:31:df:ce:42:b4:dc:1f Fingerprint (MD5): 3C:2F:0D:1E:6E:6C:9C:FA:60:1F:DD:0C:FB:B6:C0:77 Fingerprint (SHA1): 87:8A:46:E5:4F:89:2E:74:D3:AF:12:8B:01:2F:93:18:1E:3B:F6:2E Friendly Name: Alice tools.sh: #3819: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3820: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": security library: invalid algorithm. tools.sh: #3821: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3822: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #3823: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 55%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 54%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #3824: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #3825: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #3826: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 55%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 54%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #3827: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #3828: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #3829: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Mon Mar 26 17:44:24 EDT 2012 Running tests for fips TIMESTAMP fips BEGIN: Mon Mar 26 17:44:24 EDT 2012 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #3830: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #3831: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 687da02ce6aad71818726817abf959cae81b40f5 FIPS_PUB_140_Test_Certificate fips.sh: #3832: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect. fips.sh: #3833: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #3834: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #3835: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #3836: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #3837: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #3838: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #3839: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #3840: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #3841: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #3842: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 687da02ce6aad71818726817abf959cae81b40f5 FIPS_PUB_140_Test_Certificate fips.sh: #3843: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #3844: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #3845: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #3846: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #3847: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 687da02ce6aad71818726817abf959cae81b40f5 FIPS_PUB_140_Test_Certificate fips.sh: #3848: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #3849: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #3850: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle mkdir: cannot create directory `/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle': File exists cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x000bcf4d (773965): from 49 (73) to 69 (105) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle dbtest -r -d ../fips fips.sh: #3851: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Mon Mar 26 17:44:53 EDT 2012 Running tests for crmf TIMESTAMP crmf BEGIN: Mon Mar 26 17:44:53 EDT 2012 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #3852: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #3853: CMMF test . - PASSED TIMESTAMP crmf END: Mon Mar 26 17:44:53 EDT 2012 Running tests for smime TIMESTAMP smime BEGIN: Mon Mar 26 17:44:53 EDT 2012 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #3854: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #3855: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3856: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #3857: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #3858: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #3859: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #3860: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #3861: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #3862: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #3863: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #3864: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #3865: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #3866: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #3867: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #3868: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #3869: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #3870: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #3871: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #3872: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #3873: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #3874: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #3875: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #3876: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #3877: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #3878: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #3879: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #3880: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #3881: Decrypt with a Multiple Email cert . - PASSED smime.sh: #3882: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #3883: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #3884: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #3885: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #3886: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #3887: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #3888: Decode Encrypted-Data . - PASSED smime.sh: #3889: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #3890: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #3891: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #3892: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #3893: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #3894: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Mon Mar 26 17:44:55 EDT 2012 Running tests for ssl TIMESTAMP ssl BEGIN: Mon Mar 26 17:44:55 EDT 2012 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:44:56 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:44:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24007 >/dev/null 2>/dev/null selfserv_9280 with PID 24007 found at Mon Mar 26 17:44:56 EDT 2012 selfserv_9280 with PID 24007 started at Mon Mar 26 17:44:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3895: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 24007 at Mon Mar 26 17:44:56 EDT 2012 kill -USR1 24007 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24007 killed at Mon Mar 26 17:44:56 EDT 2012 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:44:56 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:44:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24063 >/dev/null 2>/dev/null selfserv_9280 with PID 24063 found at Mon Mar 26 17:44:56 EDT 2012 selfserv_9280 with PID 24063 started at Mon Mar 26 17:44:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3896: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 24063 at Mon Mar 26 17:44:56 EDT 2012 kill -USR1 24063 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24063 killed at Mon Mar 26 17:44:56 EDT 2012 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:44:56 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:44:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24119 >/dev/null 2>/dev/null selfserv_9280 with PID 24119 found at Mon Mar 26 17:44:56 EDT 2012 selfserv_9280 with PID 24119 started at Mon Mar 26 17:44:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3897: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 24119 at Mon Mar 26 17:44:56 EDT 2012 kill -USR1 24119 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24119 killed at Mon Mar 26 17:44:56 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:44:56 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:44:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24187 >/dev/null 2>/dev/null selfserv_9280 with PID 24187 found at Mon Mar 26 17:44:57 EDT 2012 selfserv_9280 with PID 24187 started at Mon Mar 26 17:44:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3898: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 24187 at Mon Mar 26 17:44:57 EDT 2012 kill -USR1 24187 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24187 killed at Mon Mar 26 17:44:57 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:44:57 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:44:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24243 >/dev/null 2>/dev/null selfserv_9280 with PID 24243 found at Mon Mar 26 17:44:57 EDT 2012 selfserv_9280 with PID 24243 started at Mon Mar 26 17:44:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3899: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 24243 at Mon Mar 26 17:44:57 EDT 2012 kill -USR1 24243 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24243 killed at Mon Mar 26 17:44:58 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:44:58 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:44:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24299 >/dev/null 2>/dev/null selfserv_9280 with PID 24299 found at Mon Mar 26 17:44:58 EDT 2012 selfserv_9280 with PID 24299 started at Mon Mar 26 17:44:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3900: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 24299 at Mon Mar 26 17:44:58 EDT 2012 kill -USR1 24299 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24299 killed at Mon Mar 26 17:44:58 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:44:58 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:44:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24367 >/dev/null 2>/dev/null selfserv_9280 with PID 24367 found at Mon Mar 26 17:44:58 EDT 2012 selfserv_9280 with PID 24367 started at Mon Mar 26 17:44:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3901: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 24367 at Mon Mar 26 17:44:58 EDT 2012 kill -USR1 24367 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24367 killed at Mon Mar 26 17:44:58 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:44:58 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:44:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24423 >/dev/null 2>/dev/null selfserv_9280 with PID 24423 found at Mon Mar 26 17:44:58 EDT 2012 selfserv_9280 with PID 24423 started at Mon Mar 26 17:44:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3902: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 24423 at Mon Mar 26 17:44:59 EDT 2012 kill -USR1 24423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24423 killed at Mon Mar 26 17:44:59 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:44:59 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:44:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24479 >/dev/null 2>/dev/null selfserv_9280 with PID 24479 found at Mon Mar 26 17:44:59 EDT 2012 selfserv_9280 with PID 24479 started at Mon Mar 26 17:44:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3903: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 24479 at Mon Mar 26 17:44:59 EDT 2012 kill -USR1 24479 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24479 killed at Mon Mar 26 17:44:59 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:44:59 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:44:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24547 >/dev/null 2>/dev/null selfserv_9280 with PID 24547 found at Mon Mar 26 17:44:59 EDT 2012 selfserv_9280 with PID 24547 started at Mon Mar 26 17:44:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3904: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 24547 at Mon Mar 26 17:44:59 EDT 2012 kill -USR1 24547 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24547 killed at Mon Mar 26 17:44:59 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:44:59 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:44:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24603 >/dev/null 2>/dev/null selfserv_9280 with PID 24603 found at Mon Mar 26 17:44:59 EDT 2012 selfserv_9280 with PID 24603 started at Mon Mar 26 17:44:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3905: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 24603 at Mon Mar 26 17:44:59 EDT 2012 kill -USR1 24603 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24603 killed at Mon Mar 26 17:44:59 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:44:59 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:44:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24659 >/dev/null 2>/dev/null selfserv_9280 with PID 24659 found at Mon Mar 26 17:45:00 EDT 2012 selfserv_9280 with PID 24659 started at Mon Mar 26 17:45:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3906: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 24659 at Mon Mar 26 17:45:00 EDT 2012 kill -USR1 24659 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24659 killed at Mon Mar 26 17:45:00 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:00 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24727 >/dev/null 2>/dev/null selfserv_9280 with PID 24727 found at Mon Mar 26 17:45:00 EDT 2012 selfserv_9280 with PID 24727 started at Mon Mar 26 17:45:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3907: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 24727 at Mon Mar 26 17:45:00 EDT 2012 kill -USR1 24727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24727 killed at Mon Mar 26 17:45:00 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:00 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24783 >/dev/null 2>/dev/null selfserv_9280 with PID 24783 found at Mon Mar 26 17:45:00 EDT 2012 selfserv_9280 with PID 24783 started at Mon Mar 26 17:45:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3908: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 24783 at Mon Mar 26 17:45:00 EDT 2012 kill -USR1 24783 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24783 killed at Mon Mar 26 17:45:00 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:00 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24839 >/dev/null 2>/dev/null selfserv_9280 with PID 24839 found at Mon Mar 26 17:45:01 EDT 2012 selfserv_9280 with PID 24839 started at Mon Mar 26 17:45:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3909: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 24839 at Mon Mar 26 17:45:01 EDT 2012 kill -USR1 24839 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24839 killed at Mon Mar 26 17:45:01 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:01 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24907 >/dev/null 2>/dev/null selfserv_9280 with PID 24907 found at Mon Mar 26 17:45:01 EDT 2012 selfserv_9280 with PID 24907 started at Mon Mar 26 17:45:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3910: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 24907 at Mon Mar 26 17:45:01 EDT 2012 kill -USR1 24907 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24907 killed at Mon Mar 26 17:45:01 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:01 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 24963 >/dev/null 2>/dev/null selfserv_9280 with PID 24963 found at Mon Mar 26 17:45:01 EDT 2012 selfserv_9280 with PID 24963 started at Mon Mar 26 17:45:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3911: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 24963 at Mon Mar 26 17:45:01 EDT 2012 kill -USR1 24963 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 24963 killed at Mon Mar 26 17:45:01 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:01 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25019 >/dev/null 2>/dev/null selfserv_9280 with PID 25019 found at Mon Mar 26 17:45:02 EDT 2012 selfserv_9280 with PID 25019 started at Mon Mar 26 17:45:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3912: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 25019 at Mon Mar 26 17:45:02 EDT 2012 kill -USR1 25019 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25019 killed at Mon Mar 26 17:45:02 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25087 >/dev/null 2>/dev/null selfserv_9280 with PID 25087 found at Mon Mar 26 17:45:02 EDT 2012 selfserv_9280 with PID 25087 started at Mon Mar 26 17:45:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3913: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 25087 at Mon Mar 26 17:45:02 EDT 2012 kill -USR1 25087 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25087 killed at Mon Mar 26 17:45:02 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25143 >/dev/null 2>/dev/null selfserv_9280 with PID 25143 found at Mon Mar 26 17:45:02 EDT 2012 selfserv_9280 with PID 25143 started at Mon Mar 26 17:45:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3914: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 25143 at Mon Mar 26 17:45:03 EDT 2012 kill -USR1 25143 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25143 killed at Mon Mar 26 17:45:03 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25199 >/dev/null 2>/dev/null selfserv_9280 with PID 25199 found at Mon Mar 26 17:45:03 EDT 2012 selfserv_9280 with PID 25199 started at Mon Mar 26 17:45:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3915: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 25199 at Mon Mar 26 17:45:03 EDT 2012 kill -USR1 25199 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25199 killed at Mon Mar 26 17:45:03 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25267 >/dev/null 2>/dev/null selfserv_9280 with PID 25267 found at Mon Mar 26 17:45:03 EDT 2012 selfserv_9280 with PID 25267 started at Mon Mar 26 17:45:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3916: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 25267 at Mon Mar 26 17:45:03 EDT 2012 kill -USR1 25267 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25267 killed at Mon Mar 26 17:45:03 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25323 >/dev/null 2>/dev/null selfserv_9280 with PID 25323 found at Mon Mar 26 17:45:03 EDT 2012 selfserv_9280 with PID 25323 started at Mon Mar 26 17:45:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3917: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 25323 at Mon Mar 26 17:45:03 EDT 2012 kill -USR1 25323 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25323 killed at Mon Mar 26 17:45:03 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25379 >/dev/null 2>/dev/null selfserv_9280 with PID 25379 found at Mon Mar 26 17:45:04 EDT 2012 selfserv_9280 with PID 25379 started at Mon Mar 26 17:45:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3918: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 25379 at Mon Mar 26 17:45:04 EDT 2012 kill -USR1 25379 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25379 killed at Mon Mar 26 17:45:04 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25447 >/dev/null 2>/dev/null selfserv_9280 with PID 25447 found at Mon Mar 26 17:45:04 EDT 2012 selfserv_9280 with PID 25447 started at Mon Mar 26 17:45:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3919: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 25447 at Mon Mar 26 17:45:04 EDT 2012 kill -USR1 25447 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25447 killed at Mon Mar 26 17:45:04 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25503 >/dev/null 2>/dev/null selfserv_9280 with PID 25503 found at Mon Mar 26 17:45:04 EDT 2012 selfserv_9280 with PID 25503 started at Mon Mar 26 17:45:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3920: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 25503 at Mon Mar 26 17:45:04 EDT 2012 kill -USR1 25503 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25503 killed at Mon Mar 26 17:45:04 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25559 >/dev/null 2>/dev/null selfserv_9280 with PID 25559 found at Mon Mar 26 17:45:05 EDT 2012 selfserv_9280 with PID 25559 started at Mon Mar 26 17:45:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3921: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 25559 at Mon Mar 26 17:45:05 EDT 2012 kill -USR1 25559 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25559 killed at Mon Mar 26 17:45:05 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25627 >/dev/null 2>/dev/null selfserv_9280 with PID 25627 found at Mon Mar 26 17:45:05 EDT 2012 selfserv_9280 with PID 25627 started at Mon Mar 26 17:45:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3922: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 25627 at Mon Mar 26 17:45:05 EDT 2012 kill -USR1 25627 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25627 killed at Mon Mar 26 17:45:05 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25683 >/dev/null 2>/dev/null selfserv_9280 with PID 25683 found at Mon Mar 26 17:45:05 EDT 2012 selfserv_9280 with PID 25683 started at Mon Mar 26 17:45:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3923: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 25683 at Mon Mar 26 17:45:05 EDT 2012 kill -USR1 25683 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25683 killed at Mon Mar 26 17:45:05 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25739 >/dev/null 2>/dev/null selfserv_9280 with PID 25739 found at Mon Mar 26 17:45:06 EDT 2012 selfserv_9280 with PID 25739 started at Mon Mar 26 17:45:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3924: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 25739 at Mon Mar 26 17:45:06 EDT 2012 kill -USR1 25739 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25739 killed at Mon Mar 26 17:45:06 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25807 >/dev/null 2>/dev/null selfserv_9280 with PID 25807 found at Mon Mar 26 17:45:06 EDT 2012 selfserv_9280 with PID 25807 started at Mon Mar 26 17:45:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3925: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 25807 at Mon Mar 26 17:45:06 EDT 2012 kill -USR1 25807 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25807 killed at Mon Mar 26 17:45:06 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25863 >/dev/null 2>/dev/null selfserv_9280 with PID 25863 found at Mon Mar 26 17:45:06 EDT 2012 selfserv_9280 with PID 25863 started at Mon Mar 26 17:45:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3926: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 25863 at Mon Mar 26 17:45:06 EDT 2012 kill -USR1 25863 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25863 killed at Mon Mar 26 17:45:06 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25919 >/dev/null 2>/dev/null selfserv_9280 with PID 25919 found at Mon Mar 26 17:45:06 EDT 2012 selfserv_9280 with PID 25919 started at Mon Mar 26 17:45:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3927: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 25919 at Mon Mar 26 17:45:07 EDT 2012 kill -USR1 25919 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25919 killed at Mon Mar 26 17:45:07 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:07 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25987 >/dev/null 2>/dev/null selfserv_9280 with PID 25987 found at Mon Mar 26 17:45:07 EDT 2012 selfserv_9280 with PID 25987 started at Mon Mar 26 17:45:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3928: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 25987 at Mon Mar 26 17:45:07 EDT 2012 kill -USR1 25987 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25987 killed at Mon Mar 26 17:45:07 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:07 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26043 >/dev/null 2>/dev/null selfserv_9280 with PID 26043 found at Mon Mar 26 17:45:07 EDT 2012 selfserv_9280 with PID 26043 started at Mon Mar 26 17:45:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3929: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 26043 at Mon Mar 26 17:45:07 EDT 2012 kill -USR1 26043 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26043 killed at Mon Mar 26 17:45:07 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:07 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26099 >/dev/null 2>/dev/null selfserv_9280 with PID 26099 found at Mon Mar 26 17:45:07 EDT 2012 selfserv_9280 with PID 26099 started at Mon Mar 26 17:45:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3930: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 26099 at Mon Mar 26 17:45:08 EDT 2012 kill -USR1 26099 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26099 killed at Mon Mar 26 17:45:08 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26167 >/dev/null 2>/dev/null selfserv_9280 with PID 26167 found at Mon Mar 26 17:45:08 EDT 2012 selfserv_9280 with PID 26167 started at Mon Mar 26 17:45:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3931: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 26167 at Mon Mar 26 17:45:08 EDT 2012 kill -USR1 26167 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26167 killed at Mon Mar 26 17:45:08 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26223 >/dev/null 2>/dev/null selfserv_9280 with PID 26223 found at Mon Mar 26 17:45:08 EDT 2012 selfserv_9280 with PID 26223 started at Mon Mar 26 17:45:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3932: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 26223 at Mon Mar 26 17:45:08 EDT 2012 kill -USR1 26223 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26223 killed at Mon Mar 26 17:45:08 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26279 >/dev/null 2>/dev/null selfserv_9280 with PID 26279 found at Mon Mar 26 17:45:08 EDT 2012 selfserv_9280 with PID 26279 started at Mon Mar 26 17:45:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3933: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 26279 at Mon Mar 26 17:45:09 EDT 2012 kill -USR1 26279 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26279 killed at Mon Mar 26 17:45:09 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26347 >/dev/null 2>/dev/null selfserv_9280 with PID 26347 found at Mon Mar 26 17:45:09 EDT 2012 selfserv_9280 with PID 26347 started at Mon Mar 26 17:45:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3934: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 26347 at Mon Mar 26 17:45:09 EDT 2012 kill -USR1 26347 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26347 killed at Mon Mar 26 17:45:09 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26403 >/dev/null 2>/dev/null selfserv_9280 with PID 26403 found at Mon Mar 26 17:45:09 EDT 2012 selfserv_9280 with PID 26403 started at Mon Mar 26 17:45:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3935: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 26403 at Mon Mar 26 17:45:09 EDT 2012 kill -USR1 26403 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26403 killed at Mon Mar 26 17:45:09 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26459 >/dev/null 2>/dev/null selfserv_9280 with PID 26459 found at Mon Mar 26 17:45:09 EDT 2012 selfserv_9280 with PID 26459 started at Mon Mar 26 17:45:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3936: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 26459 at Mon Mar 26 17:45:10 EDT 2012 kill -USR1 26459 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26459 killed at Mon Mar 26 17:45:10 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26527 >/dev/null 2>/dev/null selfserv_9280 with PID 26527 found at Mon Mar 26 17:45:10 EDT 2012 selfserv_9280 with PID 26527 started at Mon Mar 26 17:45:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3937: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 26527 at Mon Mar 26 17:45:10 EDT 2012 kill -USR1 26527 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26527 killed at Mon Mar 26 17:45:10 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26583 >/dev/null 2>/dev/null selfserv_9280 with PID 26583 found at Mon Mar 26 17:45:10 EDT 2012 selfserv_9280 with PID 26583 started at Mon Mar 26 17:45:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3938: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 26583 at Mon Mar 26 17:45:10 EDT 2012 kill -USR1 26583 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26583 killed at Mon Mar 26 17:45:10 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26639 >/dev/null 2>/dev/null selfserv_9280 with PID 26639 found at Mon Mar 26 17:45:10 EDT 2012 selfserv_9280 with PID 26639 started at Mon Mar 26 17:45:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3939: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 26639 at Mon Mar 26 17:45:11 EDT 2012 kill -USR1 26639 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26639 killed at Mon Mar 26 17:45:11 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:11 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26707 >/dev/null 2>/dev/null selfserv_9280 with PID 26707 found at Mon Mar 26 17:45:11 EDT 2012 selfserv_9280 with PID 26707 started at Mon Mar 26 17:45:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3940: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 26707 at Mon Mar 26 17:45:11 EDT 2012 kill -USR1 26707 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26707 killed at Mon Mar 26 17:45:11 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:11 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26763 >/dev/null 2>/dev/null selfserv_9280 with PID 26763 found at Mon Mar 26 17:45:11 EDT 2012 selfserv_9280 with PID 26763 started at Mon Mar 26 17:45:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3941: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 26763 at Mon Mar 26 17:45:11 EDT 2012 kill -USR1 26763 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26763 killed at Mon Mar 26 17:45:11 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:11 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26819 >/dev/null 2>/dev/null selfserv_9280 with PID 26819 found at Mon Mar 26 17:45:11 EDT 2012 selfserv_9280 with PID 26819 started at Mon Mar 26 17:45:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3942: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 26819 at Mon Mar 26 17:45:12 EDT 2012 kill -USR1 26819 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26819 killed at Mon Mar 26 17:45:12 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26887 >/dev/null 2>/dev/null selfserv_9280 with PID 26887 found at Mon Mar 26 17:45:12 EDT 2012 selfserv_9280 with PID 26887 started at Mon Mar 26 17:45:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3943: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 26887 at Mon Mar 26 17:45:12 EDT 2012 kill -USR1 26887 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26887 killed at Mon Mar 26 17:45:12 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26943 >/dev/null 2>/dev/null selfserv_9280 with PID 26943 found at Mon Mar 26 17:45:12 EDT 2012 selfserv_9280 with PID 26943 started at Mon Mar 26 17:45:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3944: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 26943 at Mon Mar 26 17:45:12 EDT 2012 kill -USR1 26943 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26943 killed at Mon Mar 26 17:45:12 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26999 >/dev/null 2>/dev/null selfserv_9280 with PID 26999 found at Mon Mar 26 17:45:12 EDT 2012 selfserv_9280 with PID 26999 started at Mon Mar 26 17:45:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3945: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 26999 at Mon Mar 26 17:45:13 EDT 2012 kill -USR1 26999 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26999 killed at Mon Mar 26 17:45:13 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:13 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27067 >/dev/null 2>/dev/null selfserv_9280 with PID 27067 found at Mon Mar 26 17:45:13 EDT 2012 selfserv_9280 with PID 27067 started at Mon Mar 26 17:45:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3946: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27067 at Mon Mar 26 17:45:13 EDT 2012 kill -USR1 27067 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27067 killed at Mon Mar 26 17:45:13 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:13 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27123 >/dev/null 2>/dev/null selfserv_9280 with PID 27123 found at Mon Mar 26 17:45:13 EDT 2012 selfserv_9280 with PID 27123 started at Mon Mar 26 17:45:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3947: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27123 at Mon Mar 26 17:45:13 EDT 2012 kill -USR1 27123 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27123 killed at Mon Mar 26 17:45:13 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:13 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27179 >/dev/null 2>/dev/null selfserv_9280 with PID 27179 found at Mon Mar 26 17:45:13 EDT 2012 selfserv_9280 with PID 27179 started at Mon Mar 26 17:45:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3948: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27179 at Mon Mar 26 17:45:14 EDT 2012 kill -USR1 27179 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27179 killed at Mon Mar 26 17:45:14 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27247 >/dev/null 2>/dev/null selfserv_9280 with PID 27247 found at Mon Mar 26 17:45:14 EDT 2012 selfserv_9280 with PID 27247 started at Mon Mar 26 17:45:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3949: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27247 at Mon Mar 26 17:45:14 EDT 2012 kill -USR1 27247 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27247 killed at Mon Mar 26 17:45:14 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27303 >/dev/null 2>/dev/null selfserv_9280 with PID 27303 found at Mon Mar 26 17:45:14 EDT 2012 selfserv_9280 with PID 27303 started at Mon Mar 26 17:45:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3950: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27303 at Mon Mar 26 17:45:14 EDT 2012 kill -USR1 27303 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27303 killed at Mon Mar 26 17:45:14 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27359 >/dev/null 2>/dev/null selfserv_9280 with PID 27359 found at Mon Mar 26 17:45:14 EDT 2012 selfserv_9280 with PID 27359 started at Mon Mar 26 17:45:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3951: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27359 at Mon Mar 26 17:45:15 EDT 2012 kill -USR1 27359 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27359 killed at Mon Mar 26 17:45:15 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27427 >/dev/null 2>/dev/null selfserv_9280 with PID 27427 found at Mon Mar 26 17:45:15 EDT 2012 selfserv_9280 with PID 27427 started at Mon Mar 26 17:45:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3952: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27427 at Mon Mar 26 17:45:15 EDT 2012 kill -USR1 27427 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27427 killed at Mon Mar 26 17:45:15 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27483 >/dev/null 2>/dev/null selfserv_9280 with PID 27483 found at Mon Mar 26 17:45:15 EDT 2012 selfserv_9280 with PID 27483 started at Mon Mar 26 17:45:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3953: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27483 at Mon Mar 26 17:45:15 EDT 2012 kill -USR1 27483 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27483 killed at Mon Mar 26 17:45:15 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27539 >/dev/null 2>/dev/null selfserv_9280 with PID 27539 found at Mon Mar 26 17:45:15 EDT 2012 selfserv_9280 with PID 27539 started at Mon Mar 26 17:45:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3954: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27539 at Mon Mar 26 17:45:16 EDT 2012 kill -USR1 27539 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27539 killed at Mon Mar 26 17:45:16 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27607 >/dev/null 2>/dev/null selfserv_9280 with PID 27607 found at Mon Mar 26 17:45:16 EDT 2012 selfserv_9280 with PID 27607 started at Mon Mar 26 17:45:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3955: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27607 at Mon Mar 26 17:45:16 EDT 2012 kill -USR1 27607 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27607 killed at Mon Mar 26 17:45:16 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27663 >/dev/null 2>/dev/null selfserv_9280 with PID 27663 found at Mon Mar 26 17:45:16 EDT 2012 selfserv_9280 with PID 27663 started at Mon Mar 26 17:45:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3956: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 27663 at Mon Mar 26 17:45:16 EDT 2012 kill -USR1 27663 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27663 killed at Mon Mar 26 17:45:16 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27719 >/dev/null 2>/dev/null selfserv_9280 with PID 27719 found at Mon Mar 26 17:45:16 EDT 2012 selfserv_9280 with PID 27719 started at Mon Mar 26 17:45:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3957: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27719 at Mon Mar 26 17:45:17 EDT 2012 kill -USR1 27719 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27719 killed at Mon Mar 26 17:45:17 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27787 >/dev/null 2>/dev/null selfserv_9280 with PID 27787 found at Mon Mar 26 17:45:17 EDT 2012 selfserv_9280 with PID 27787 started at Mon Mar 26 17:45:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3958: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27787 at Mon Mar 26 17:45:17 EDT 2012 kill -USR1 27787 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27787 killed at Mon Mar 26 17:45:17 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27843 >/dev/null 2>/dev/null selfserv_9280 with PID 27843 found at Mon Mar 26 17:45:17 EDT 2012 selfserv_9280 with PID 27843 started at Mon Mar 26 17:45:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3959: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27843 at Mon Mar 26 17:45:17 EDT 2012 kill -USR1 27843 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27843 killed at Mon Mar 26 17:45:17 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27899 >/dev/null 2>/dev/null selfserv_9280 with PID 27899 found at Mon Mar 26 17:45:17 EDT 2012 selfserv_9280 with PID 27899 started at Mon Mar 26 17:45:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3960: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27899 at Mon Mar 26 17:45:18 EDT 2012 kill -USR1 27899 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27899 killed at Mon Mar 26 17:45:18 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27967 >/dev/null 2>/dev/null selfserv_9280 with PID 27967 found at Mon Mar 26 17:45:18 EDT 2012 selfserv_9280 with PID 27967 started at Mon Mar 26 17:45:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3961: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 27967 at Mon Mar 26 17:45:18 EDT 2012 kill -USR1 27967 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27967 killed at Mon Mar 26 17:45:18 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28023 >/dev/null 2>/dev/null selfserv_9280 with PID 28023 found at Mon Mar 26 17:45:18 EDT 2012 selfserv_9280 with PID 28023 started at Mon Mar 26 17:45:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3962: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 28023 at Mon Mar 26 17:45:18 EDT 2012 kill -USR1 28023 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28023 killed at Mon Mar 26 17:45:18 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:45:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28079 >/dev/null 2>/dev/null selfserv_9280 with PID 28079 found at Mon Mar 26 17:45:18 EDT 2012 selfserv_9280 with PID 28079 started at Mon Mar 26 17:45:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3963: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 28079 at Mon Mar 26 17:45:19 EDT 2012 kill -USR1 28079 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28079 killed at Mon Mar 26 17:45:19 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:19 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28147 >/dev/null 2>/dev/null selfserv_9280 with PID 28147 found at Mon Mar 26 17:45:19 EDT 2012 selfserv_9280 with PID 28147 started at Mon Mar 26 17:45:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3964: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 28147 at Mon Mar 26 17:45:19 EDT 2012 kill -USR1 28147 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28147 killed at Mon Mar 26 17:45:19 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:19 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28203 >/dev/null 2>/dev/null selfserv_9280 with PID 28203 found at Mon Mar 26 17:45:19 EDT 2012 selfserv_9280 with PID 28203 started at Mon Mar 26 17:45:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3965: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 28203 at Mon Mar 26 17:45:19 EDT 2012 kill -USR1 28203 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28203 killed at Mon Mar 26 17:45:19 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:19 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28259 >/dev/null 2>/dev/null selfserv_9280 with PID 28259 found at Mon Mar 26 17:45:19 EDT 2012 selfserv_9280 with PID 28259 started at Mon Mar 26 17:45:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3966: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 28259 at Mon Mar 26 17:45:20 EDT 2012 kill -USR1 28259 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28259 killed at Mon Mar 26 17:45:20 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/authin.tl.tmp 0 selfserv_9280 starting at Mon Mar 26 17:45:20 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:20 EDT 2012 selfserv_9280 with PID 28331 started at Mon Mar 26 17:45:20 EDT 2012 Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:20 EDT 2012 ssl.sh: #3967: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:20 EDT 2012 ssl.sh: #3968: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:20 EDT 2012 ssl.sh: #3969: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:20 EDT 2012 ssl.sh: #3970: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:21 EDT 2012 ssl.sh: #3971: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:21 EDT 2012 ssl.sh: #3972: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:21 EDT 2012 ssl.sh: #3973: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:21 EDT 2012 ssl.sh: #3974: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:21 EDT 2012 ssl.sh: #3975: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:21 EDT 2012 ssl.sh: #3976: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:21 EDT 2012 ssl.sh: #3977: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:21 EDT 2012 ssl.sh: #3978: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:22 EDT 2012 ssl.sh: #3979: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:22 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #3980: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:22 EDT 2012 ssl.sh: #3981: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:22 EDT 2012 ssl.sh: #3982: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:22 EDT 2012 ssl.sh: #3983: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:22 EDT 2012 ssl.sh: #3984: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:22 EDT 2012 ssl.sh: #3985: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:22 EDT 2012 ssl.sh: #3986: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:23 EDT 2012 ssl.sh: #3987: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:23 EDT 2012 ssl.sh: #3988: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:23 EDT 2012 ssl.sh: #3989: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:23 EDT 2012 ssl.sh: #3990: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:23 EDT 2012 ssl.sh: #3991: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:23 EDT 2012 ssl.sh: #3992: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:23 EDT 2012 ssl.sh: #3993: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:23 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #3994: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:24 EDT 2012 ssl.sh: #3995: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:24 EDT 2012 ssl.sh: #3996: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:24 EDT 2012 ssl.sh: #3997: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:24 EDT 2012 ssl.sh: #3998: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:24 EDT 2012 ssl.sh: #3999: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:24 EDT 2012 ssl.sh: #4000: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:24 EDT 2012 ssl.sh: #4001: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:24 EDT 2012 ssl.sh: #4002: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:24 EDT 2012 ssl.sh: #4003: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:25 EDT 2012 ssl.sh: #4004: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:25 EDT 2012 ssl.sh: #4005: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:25 EDT 2012 ssl.sh: #4006: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 28331 >/dev/null 2>/dev/null selfserv_9280 with PID 28331 found at Mon Mar 26 17:45:25 EDT 2012 ssl.sh: #4007: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 28331 at Mon Mar 26 17:45:25 EDT 2012 kill -USR1 28331 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28331 killed at Mon Mar 26 17:45:25 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:25 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:25 EDT 2012 selfserv_9280 with PID 29751 started at Mon Mar 26 17:45:25 EDT 2012 Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:25 EDT 2012 ssl.sh: #4008: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:25 EDT 2012 ssl.sh: #4009: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:26 EDT 2012 ssl.sh: #4010: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:26 EDT 2012 ssl.sh: #4011: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:26 EDT 2012 ssl.sh: #4012: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:26 EDT 2012 ssl.sh: #4013: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:26 EDT 2012 ssl.sh: #4014: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:26 EDT 2012 ssl.sh: #4015: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:26 EDT 2012 ssl.sh: #4016: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:26 EDT 2012 ssl.sh: #4017: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:27 EDT 2012 ssl.sh: #4018: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:27 EDT 2012 ssl.sh: #4019: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:27 EDT 2012 ssl.sh: #4020: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:27 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4021: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:27 EDT 2012 ssl.sh: #4022: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:27 EDT 2012 ssl.sh: #4023: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:27 EDT 2012 ssl.sh: #4024: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:27 EDT 2012 ssl.sh: #4025: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:27 EDT 2012 ssl.sh: #4026: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:28 EDT 2012 ssl.sh: #4027: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:28 EDT 2012 ssl.sh: #4028: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:28 EDT 2012 ssl.sh: #4029: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:28 EDT 2012 ssl.sh: #4030: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:28 EDT 2012 ssl.sh: #4031: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:28 EDT 2012 ssl.sh: #4032: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:28 EDT 2012 ssl.sh: #4033: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:28 EDT 2012 ssl.sh: #4034: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:29 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4035: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:29 EDT 2012 ssl.sh: #4036: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:29 EDT 2012 ssl.sh: #4037: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:29 EDT 2012 ssl.sh: #4038: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:29 EDT 2012 ssl.sh: #4039: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:29 EDT 2012 ssl.sh: #4040: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:29 EDT 2012 ssl.sh: #4041: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:29 EDT 2012 ssl.sh: #4042: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:30 EDT 2012 ssl.sh: #4043: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:30 EDT 2012 ssl.sh: #4044: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:30 EDT 2012 ssl.sh: #4045: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:30 EDT 2012 ssl.sh: #4046: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:30 EDT 2012 ssl.sh: #4047: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 29751 >/dev/null 2>/dev/null selfserv_9280 with PID 29751 found at Mon Mar 26 17:45:30 EDT 2012 ssl.sh: #4048: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 29751 at Mon Mar 26 17:45:30 EDT 2012 kill -USR1 29751 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29751 killed at Mon Mar 26 17:45:30 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31175 >/dev/null 2>/dev/null selfserv_9280 with PID 31175 found at Mon Mar 26 17:45:30 EDT 2012 selfserv_9280 with PID 31175 started at Mon Mar 26 17:45:30 EDT 2012 ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) trying to kill selfserv_9280 with PID 31175 at Mon Mar 26 17:45:30 EDT 2012 kill -USR1 31175 ./ssl.sh: line 207: 31175 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9280 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31175 killed at Mon Mar 26 17:45:30 EDT 2012 selfserv_9280 starting at Mon Mar 26 17:45:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:30 EDT 2012 selfserv_9280 with PID 31217 started at Mon Mar 26 17:45:30 EDT 2012 Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:31 EDT 2012 ssl.sh: #4049: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:31 EDT 2012 ssl.sh: #4050: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:31 EDT 2012 ssl.sh: #4051: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:31 EDT 2012 ssl.sh: #4052: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:31 EDT 2012 ssl.sh: #4053: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:31 EDT 2012 ssl.sh: #4054: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:31 EDT 2012 ssl.sh: #4055: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:32 EDT 2012 ssl.sh: #4056: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:32 EDT 2012 ssl.sh: #4057: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:32 EDT 2012 ssl.sh: #4058: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:32 EDT 2012 ssl.sh: #4059: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:32 EDT 2012 ssl.sh: #4060: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:32 EDT 2012 ssl.sh: #4061: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:32 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4062: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:32 EDT 2012 ssl.sh: #4063: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:33 EDT 2012 ssl.sh: #4064: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:33 EDT 2012 ssl.sh: #4065: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:33 EDT 2012 ssl.sh: #4066: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:33 EDT 2012 ssl.sh: #4067: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:33 EDT 2012 ssl.sh: #4068: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:33 EDT 2012 ssl.sh: #4069: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:33 EDT 2012 ssl.sh: #4070: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:34 EDT 2012 ssl.sh: #4071: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:34 EDT 2012 ssl.sh: #4072: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:34 EDT 2012 ssl.sh: #4073: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:34 EDT 2012 ssl.sh: #4074: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:34 EDT 2012 ssl.sh: #4075: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:34 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4076: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:34 EDT 2012 ssl.sh: #4077: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:34 EDT 2012 ssl.sh: #4078: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:35 EDT 2012 ssl.sh: #4079: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:35 EDT 2012 ssl.sh: #4080: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:35 EDT 2012 ssl.sh: #4081: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:35 EDT 2012 ssl.sh: #4082: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:35 EDT 2012 ssl.sh: #4083: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:35 EDT 2012 ssl.sh: #4084: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:35 EDT 2012 ssl.sh: #4085: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:35 EDT 2012 ssl.sh: #4086: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:36 EDT 2012 ssl.sh: #4087: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:36 EDT 2012 ssl.sh: #4088: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 31217 >/dev/null 2>/dev/null selfserv_9280 with PID 31217 found at Mon Mar 26 17:45:36 EDT 2012 ssl.sh: #4089: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 31217 at Mon Mar 26 17:45:36 EDT 2012 kill -USR1 31217 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 31217 killed at Mon Mar 26 17:45:36 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:36 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:36 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:36 EDT 2012 selfserv_9280 with PID 32637 started at Mon Mar 26 17:45:36 EDT 2012 Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:36 EDT 2012 ssl.sh: #4090: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:36 EDT 2012 ssl.sh: #4091: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:36 EDT 2012 ssl.sh: #4092: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:37 EDT 2012 ssl.sh: #4093: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:37 EDT 2012 ssl.sh: #4094: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:37 EDT 2012 ssl.sh: #4095: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:37 EDT 2012 ssl.sh: #4096: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:37 EDT 2012 ssl.sh: #4097: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:37 EDT 2012 ssl.sh: #4098: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:37 EDT 2012 ssl.sh: #4099: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:38 EDT 2012 ssl.sh: #4100: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:38 EDT 2012 ssl.sh: #4101: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:38 EDT 2012 ssl.sh: #4102: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:38 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4103: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:38 EDT 2012 ssl.sh: #4104: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:38 EDT 2012 ssl.sh: #4105: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:38 EDT 2012 ssl.sh: #4106: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:38 EDT 2012 ssl.sh: #4107: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:39 EDT 2012 ssl.sh: #4108: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:39 EDT 2012 ssl.sh: #4109: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:39 EDT 2012 ssl.sh: #4110: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:39 EDT 2012 ssl.sh: #4111: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:39 EDT 2012 ssl.sh: #4112: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:39 EDT 2012 ssl.sh: #4113: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:39 EDT 2012 ssl.sh: #4114: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:39 EDT 2012 ssl.sh: #4115: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:40 EDT 2012 ssl.sh: #4116: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:40 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4117: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:40 EDT 2012 ssl.sh: #4118: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:40 EDT 2012 ssl.sh: #4119: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:40 EDT 2012 ssl.sh: #4120: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:40 EDT 2012 ssl.sh: #4121: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:40 EDT 2012 ssl.sh: #4122: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:40 EDT 2012 ssl.sh: #4123: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:41 EDT 2012 ssl.sh: #4124: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:41 EDT 2012 ssl.sh: #4125: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:41 EDT 2012 ssl.sh: #4126: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:41 EDT 2012 ssl.sh: #4127: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:41 EDT 2012 ssl.sh: #4128: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:41 EDT 2012 ssl.sh: #4129: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32637 >/dev/null 2>/dev/null selfserv_9280 with PID 32637 found at Mon Mar 26 17:45:41 EDT 2012 ssl.sh: #4130: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 32637 at Mon Mar 26 17:45:41 EDT 2012 kill -USR1 32637 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 32637 killed at Mon Mar 26 17:45:41 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:41 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1637 >/dev/null 2>/dev/null selfserv_9280 with PID 1637 found at Mon Mar 26 17:45:41 EDT 2012 selfserv_9280 with PID 1637 started at Mon Mar 26 17:45:41 EDT 2012 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9280 with PID 1637 at Mon Mar 26 17:45:41 EDT 2012 kill -USR1 1637 ./ssl.sh: line 207: 1637 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9280 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1637 killed at Mon Mar 26 17:45:41 EDT 2012 selfserv_9280 starting at Mon Mar 26 17:45:41 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:41 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:42 EDT 2012 selfserv_9280 with PID 1679 started at Mon Mar 26 17:45:42 EDT 2012 Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:42 EDT 2012 ssl.sh: #4131: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:42 EDT 2012 ssl.sh: #4132: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:42 EDT 2012 ssl.sh: #4133: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:42 EDT 2012 ssl.sh: #4134: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:42 EDT 2012 ssl.sh: #4135: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:42 EDT 2012 ssl.sh: #4136: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:43 EDT 2012 ssl.sh: #4137: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:43 EDT 2012 ssl.sh: #4138: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:43 EDT 2012 ssl.sh: #4139: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:43 EDT 2012 ssl.sh: #4140: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:43 EDT 2012 ssl.sh: #4141: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:43 EDT 2012 ssl.sh: #4142: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:43 EDT 2012 ssl.sh: #4143: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:43 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4144: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:44 EDT 2012 ssl.sh: #4145: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:44 EDT 2012 ssl.sh: #4146: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:44 EDT 2012 ssl.sh: #4147: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:44 EDT 2012 ssl.sh: #4148: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:44 EDT 2012 ssl.sh: #4149: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:44 EDT 2012 ssl.sh: #4150: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:44 EDT 2012 ssl.sh: #4151: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:44 EDT 2012 ssl.sh: #4152: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:45 EDT 2012 ssl.sh: #4153: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:45 EDT 2012 ssl.sh: #4154: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:45 EDT 2012 ssl.sh: #4155: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:45 EDT 2012 ssl.sh: #4156: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:45 EDT 2012 ssl.sh: #4157: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:45 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4158: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:45 EDT 2012 ssl.sh: #4159: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:46 EDT 2012 ssl.sh: #4160: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:46 EDT 2012 ssl.sh: #4161: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:46 EDT 2012 ssl.sh: #4162: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:46 EDT 2012 ssl.sh: #4163: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:46 EDT 2012 ssl.sh: #4164: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:46 EDT 2012 ssl.sh: #4165: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:46 EDT 2012 ssl.sh: #4166: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:46 EDT 2012 ssl.sh: #4167: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:47 EDT 2012 ssl.sh: #4168: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:47 EDT 2012 ssl.sh: #4169: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:47 EDT 2012 ssl.sh: #4170: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1679 >/dev/null 2>/dev/null selfserv_9280 with PID 1679 found at Mon Mar 26 17:45:47 EDT 2012 ssl.sh: #4171: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 1679 at Mon Mar 26 17:45:47 EDT 2012 kill -USR1 1679 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 1679 killed at Mon Mar 26 17:45:47 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:47 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:47 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:47 EDT 2012 selfserv_9280 with PID 3099 started at Mon Mar 26 17:45:47 EDT 2012 Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:47 EDT 2012 ssl.sh: #4172: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:47 EDT 2012 ssl.sh: #4173: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:48 EDT 2012 ssl.sh: #4174: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:48 EDT 2012 ssl.sh: #4175: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:48 EDT 2012 ssl.sh: #4176: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:48 EDT 2012 ssl.sh: #4177: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:48 EDT 2012 ssl.sh: #4178: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:48 EDT 2012 ssl.sh: #4179: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:48 EDT 2012 ssl.sh: #4180: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:49 EDT 2012 ssl.sh: #4181: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:49 EDT 2012 ssl.sh: #4182: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:49 EDT 2012 ssl.sh: #4183: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:49 EDT 2012 ssl.sh: #4184: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:49 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4185: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:49 EDT 2012 ssl.sh: #4186: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:49 EDT 2012 ssl.sh: #4187: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:49 EDT 2012 ssl.sh: #4188: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:50 EDT 2012 ssl.sh: #4189: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:50 EDT 2012 ssl.sh: #4190: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:50 EDT 2012 ssl.sh: #4191: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:50 EDT 2012 ssl.sh: #4192: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:50 EDT 2012 ssl.sh: #4193: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:50 EDT 2012 ssl.sh: #4194: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:50 EDT 2012 ssl.sh: #4195: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:50 EDT 2012 ssl.sh: #4196: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:51 EDT 2012 ssl.sh: #4197: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:51 EDT 2012 ssl.sh: #4198: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:51 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4199: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:51 EDT 2012 ssl.sh: #4200: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:51 EDT 2012 ssl.sh: #4201: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:51 EDT 2012 ssl.sh: #4202: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:51 EDT 2012 ssl.sh: #4203: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:51 EDT 2012 ssl.sh: #4204: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:52 EDT 2012 ssl.sh: #4205: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:52 EDT 2012 ssl.sh: #4206: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:52 EDT 2012 ssl.sh: #4207: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:52 EDT 2012 ssl.sh: #4208: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:52 EDT 2012 ssl.sh: #4209: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:52 EDT 2012 ssl.sh: #4210: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:52 EDT 2012 ssl.sh: #4211: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 3099 >/dev/null 2>/dev/null selfserv_9280 with PID 3099 found at Mon Mar 26 17:45:53 EDT 2012 ssl.sh: #4212: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 3099 at Mon Mar 26 17:45:53 EDT 2012 kill -USR1 3099 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 3099 killed at Mon Mar 26 17:45:53 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:45:53 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:53 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4519 >/dev/null 2>/dev/null selfserv_9280 with PID 4519 found at Mon Mar 26 17:45:53 EDT 2012 selfserv_9280 with PID 4519 started at Mon Mar 26 17:45:53 EDT 2012 ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9280 with PID 4519 at Mon Mar 26 17:45:53 EDT 2012 kill -USR1 4519 ./ssl.sh: line 207: 4519 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9280 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4519 killed at Mon Mar 26 17:45:53 EDT 2012 ssl.sh: SSL Stress Test - server bypass/client bypass =============================== ssl.sh: Stress SSL2 RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:45:53 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:53 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4867 >/dev/null 2>/dev/null selfserv_9280 with PID 4867 found at Mon Mar 26 17:45:53 EDT 2012 selfserv_9280 with PID 4867 started at Mon Mar 26 17:45:53 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 1000 -C A \ localhost.localdomain strsclnt started at Mon Mar 26 17:45:53 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: SSL2 - 1 server certificates tested. strsclnt completed at Mon Mar 26 17:45:54 EDT 2012 ssl.sh: #4213: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 4867 at Mon Mar 26 17:45:54 EDT 2012 kill -USR1 4867 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4867 killed at Mon Mar 26 17:45:54 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:45:54 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:54 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 4943 >/dev/null 2>/dev/null selfserv_9280 with PID 4943 found at Mon Mar 26 17:45:54 EDT 2012 selfserv_9280 with PID 4943 started at Mon Mar 26 17:45:54 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:45:54 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:45:54 EDT 2012 ssl.sh: #4214: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 4943 at Mon Mar 26 17:45:54 EDT 2012 kill -USR1 4943 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 4943 killed at Mon Mar 26 17:45:54 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:45:54 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:54 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5019 >/dev/null 2>/dev/null selfserv_9280 with PID 5019 found at Mon Mar 26 17:45:54 EDT 2012 selfserv_9280 with PID 5019 started at Mon Mar 26 17:45:54 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:45:54 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:45:55 EDT 2012 ssl.sh: #4215: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5019 at Mon Mar 26 17:45:55 EDT 2012 kill -USR1 5019 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5019 killed at Mon Mar 26 17:45:55 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9280 starting at Mon Mar 26 17:45:55 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:55 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5107 >/dev/null 2>/dev/null selfserv_9280 with PID 5107 found at Mon Mar 26 17:45:55 EDT 2012 selfserv_9280 with PID 5107 started at Mon Mar 26 17:45:55 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:45:55 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:45:56 EDT 2012 ssl.sh: #4216: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5107 at Mon Mar 26 17:45:56 EDT 2012 kill -USR1 5107 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5107 killed at Mon Mar 26 17:45:56 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9280 starting at Mon Mar 26 17:45:56 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5183 >/dev/null 2>/dev/null selfserv_9280 with PID 5183 found at Mon Mar 26 17:45:56 EDT 2012 selfserv_9280 with PID 5183 started at Mon Mar 26 17:45:56 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:45:56 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:45:56 EDT 2012 ssl.sh: #4217: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5183 at Mon Mar 26 17:45:56 EDT 2012 kill -USR1 5183 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5183 killed at Mon Mar 26 17:45:56 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9280 starting at Mon Mar 26 17:45:56 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:56 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5259 >/dev/null 2>/dev/null selfserv_9280 with PID 5259 found at Mon Mar 26 17:45:56 EDT 2012 selfserv_9280 with PID 5259 started at Mon Mar 26 17:45:56 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:45:56 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:45:57 EDT 2012 ssl.sh: #4218: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5259 at Mon Mar 26 17:45:57 EDT 2012 kill -USR1 5259 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5259 killed at Mon Mar 26 17:45:57 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9280 starting at Mon Mar 26 17:45:57 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:57 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5335 >/dev/null 2>/dev/null selfserv_9280 with PID 5335 found at Mon Mar 26 17:45:57 EDT 2012 selfserv_9280 with PID 5335 started at Mon Mar 26 17:45:57 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:45:57 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:45:58 EDT 2012 ssl.sh: #4219: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5335 at Mon Mar 26 17:45:58 EDT 2012 kill -USR1 5335 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5335 killed at Mon Mar 26 17:45:58 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9280 starting at Mon Mar 26 17:45:58 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:58 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5411 >/dev/null 2>/dev/null selfserv_9280 with PID 5411 found at Mon Mar 26 17:45:58 EDT 2012 selfserv_9280 with PID 5411 started at Mon Mar 26 17:45:58 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:45:58 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:45:59 EDT 2012 ssl.sh: #4220: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5411 at Mon Mar 26 17:45:59 EDT 2012 kill -USR1 5411 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5411 killed at Mon Mar 26 17:45:59 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9280 starting at Mon Mar 26 17:45:59 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:45:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5493 >/dev/null 2>/dev/null selfserv_9280 with PID 5493 found at Mon Mar 26 17:45:59 EDT 2012 selfserv_9280 with PID 5493 started at Mon Mar 26 17:45:59 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:45:59 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:46:00 EDT 2012 ssl.sh: #4221: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5493 at Mon Mar 26 17:46:00 EDT 2012 kill -USR1 5493 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5493 killed at Mon Mar 26 17:46:00 EDT 2012 ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:46:00 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:00 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5590 >/dev/null 2>/dev/null selfserv_9280 with PID 5590 found at Mon Mar 26 17:46:00 EDT 2012 selfserv_9280 with PID 5590 started at Mon Mar 26 17:46:00 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:00 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: SSL2 - 100 server certificates tested. strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:46:01 EDT 2012 ssl.sh: #4222: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5590 at Mon Mar 26 17:46:01 EDT 2012 kill -USR1 5590 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5590 killed at Mon Mar 26 17:46:01 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:46:01 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:01 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5665 >/dev/null 2>/dev/null selfserv_9280 with PID 5665 found at Mon Mar 26 17:46:01 EDT 2012 selfserv_9280 with PID 5665 started at Mon Mar 26 17:46:01 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:01 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:46:02 EDT 2012 ssl.sh: #4223: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5665 at Mon Mar 26 17:46:02 EDT 2012 kill -USR1 5665 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5665 killed at Mon Mar 26 17:46:02 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:46:02 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:02 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5740 >/dev/null 2>/dev/null selfserv_9280 with PID 5740 found at Mon Mar 26 17:46:02 EDT 2012 selfserv_9280 with PID 5740 started at Mon Mar 26 17:46:02 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:02 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:46:03 EDT 2012 ssl.sh: #4224: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5740 at Mon Mar 26 17:46:03 EDT 2012 kill -USR1 5740 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5740 killed at Mon Mar 26 17:46:03 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:46:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5815 >/dev/null 2>/dev/null selfserv_9280 with PID 5815 found at Mon Mar 26 17:46:03 EDT 2012 selfserv_9280 with PID 5815 started at Mon Mar 26 17:46:03 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:03 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:46:03 EDT 2012 ssl.sh: #4225: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5815 at Mon Mar 26 17:46:03 EDT 2012 kill -USR1 5815 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5815 killed at Mon Mar 26 17:46:03 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:46:03 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:03 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5891 >/dev/null 2>/dev/null selfserv_9280 with PID 5891 found at Mon Mar 26 17:46:04 EDT 2012 selfserv_9280 with PID 5891 started at Mon Mar 26 17:46:04 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:04 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:46:04 EDT 2012 ssl.sh: #4226: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5891 at Mon Mar 26 17:46:04 EDT 2012 kill -USR1 5891 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5891 killed at Mon Mar 26 17:46:04 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:46:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 5967 >/dev/null 2>/dev/null selfserv_9280 with PID 5967 found at Mon Mar 26 17:46:04 EDT 2012 selfserv_9280 with PID 5967 started at Mon Mar 26 17:46:04 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:04 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:46:04 EDT 2012 ssl.sh: #4227: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 5967 at Mon Mar 26 17:46:04 EDT 2012 kill -USR1 5967 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 5967 killed at Mon Mar 26 17:46:04 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:46:04 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:04 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6043 >/dev/null 2>/dev/null selfserv_9280 with PID 6043 found at Mon Mar 26 17:46:04 EDT 2012 selfserv_9280 with PID 6043 started at Mon Mar 26 17:46:04 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:04 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:46:05 EDT 2012 ssl.sh: #4228: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6043 at Mon Mar 26 17:46:05 EDT 2012 kill -USR1 6043 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6043 killed at Mon Mar 26 17:46:05 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:46:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6119 >/dev/null 2>/dev/null selfserv_9280 with PID 6119 found at Mon Mar 26 17:46:05 EDT 2012 selfserv_9280 with PID 6119 started at Mon Mar 26 17:46:05 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:05 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:46:05 EDT 2012 ssl.sh: #4229: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6119 at Mon Mar 26 17:46:05 EDT 2012 kill -USR1 6119 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6119 killed at Mon Mar 26 17:46:05 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9280 starting at Mon Mar 26 17:46:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6201 >/dev/null 2>/dev/null selfserv_9280 with PID 6201 found at Mon Mar 26 17:46:05 EDT 2012 selfserv_9280 with PID 6201 started at Mon Mar 26 17:46:05 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:05 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:46:06 EDT 2012 ssl.sh: #4230: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6201 at Mon Mar 26 17:46:06 EDT 2012 kill -USR1 6201 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6201 killed at Mon Mar 26 17:46:06 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9280 starting at Mon Mar 26 17:46:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6283 >/dev/null 2>/dev/null selfserv_9280 with PID 6283 found at Mon Mar 26 17:46:06 EDT 2012 selfserv_9280 with PID 6283 started at Mon Mar 26 17:46:06 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:06 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:46:07 EDT 2012 ssl.sh: #4231: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6283 at Mon Mar 26 17:46:07 EDT 2012 kill -USR1 6283 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6283 killed at Mon Mar 26 17:46:07 EDT 2012 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:46:07 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6740 >/dev/null 2>/dev/null selfserv_9280 with PID 6740 found at Mon Mar 26 17:46:07 EDT 2012 selfserv_9280 with PID 6740 started at Mon Mar 26 17:46:07 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:07 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:46:08 EDT 2012 ssl.sh: #4232: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6740 at Mon Mar 26 17:46:08 EDT 2012 kill -USR1 6740 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6740 killed at Mon Mar 26 17:46:08 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:46:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6816 >/dev/null 2>/dev/null selfserv_9280 with PID 6816 found at Mon Mar 26 17:46:08 EDT 2012 selfserv_9280 with PID 6816 started at Mon Mar 26 17:46:08 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:08 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:46:09 EDT 2012 ssl.sh: #4233: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6816 at Mon Mar 26 17:46:09 EDT 2012 kill -USR1 6816 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6816 killed at Mon Mar 26 17:46:09 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9280 starting at Mon Mar 26 17:46:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6892 >/dev/null 2>/dev/null selfserv_9280 with PID 6892 found at Mon Mar 26 17:46:09 EDT 2012 selfserv_9280 with PID 6892 started at Mon Mar 26 17:46:09 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:09 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:46:09 EDT 2012 ssl.sh: #4234: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6892 at Mon Mar 26 17:46:09 EDT 2012 kill -USR1 6892 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6892 killed at Mon Mar 26 17:46:09 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9280 starting at Mon Mar 26 17:46:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 6968 >/dev/null 2>/dev/null selfserv_9280 with PID 6968 found at Mon Mar 26 17:46:10 EDT 2012 selfserv_9280 with PID 6968 started at Mon Mar 26 17:46:10 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:10 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:46:10 EDT 2012 ssl.sh: #4235: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 6968 at Mon Mar 26 17:46:10 EDT 2012 kill -USR1 6968 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 6968 killed at Mon Mar 26 17:46:10 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9280 starting at Mon Mar 26 17:46:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7044 >/dev/null 2>/dev/null selfserv_9280 with PID 7044 found at Mon Mar 26 17:46:10 EDT 2012 selfserv_9280 with PID 7044 started at Mon Mar 26 17:46:10 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:10 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:46:11 EDT 2012 ssl.sh: #4236: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7044 at Mon Mar 26 17:46:11 EDT 2012 kill -USR1 7044 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7044 killed at Mon Mar 26 17:46:11 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9280 starting at Mon Mar 26 17:46:11 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7120 >/dev/null 2>/dev/null selfserv_9280 with PID 7120 found at Mon Mar 26 17:46:11 EDT 2012 selfserv_9280 with PID 7120 started at Mon Mar 26 17:46:11 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:11 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:46:12 EDT 2012 ssl.sh: #4237: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7120 at Mon Mar 26 17:46:12 EDT 2012 kill -USR1 7120 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7120 killed at Mon Mar 26 17:46:12 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9280 starting at Mon Mar 26 17:46:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7196 >/dev/null 2>/dev/null selfserv_9280 with PID 7196 found at Mon Mar 26 17:46:12 EDT 2012 selfserv_9280 with PID 7196 started at Mon Mar 26 17:46:12 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:12 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:46:13 EDT 2012 ssl.sh: #4238: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7196 at Mon Mar 26 17:46:13 EDT 2012 kill -USR1 7196 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7196 killed at Mon Mar 26 17:46:13 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:46:13 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7301 >/dev/null 2>/dev/null selfserv_9280 with PID 7301 found at Mon Mar 26 17:46:13 EDT 2012 selfserv_9280 with PID 7301 started at Mon Mar 26 17:46:13 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:13 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:46:15 EDT 2012 ssl.sh: #4239: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7301 at Mon Mar 26 17:46:15 EDT 2012 kill -USR1 7301 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7301 killed at Mon Mar 26 17:46:15 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:46:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7376 >/dev/null 2>/dev/null selfserv_9280 with PID 7376 found at Mon Mar 26 17:46:15 EDT 2012 selfserv_9280 with PID 7376 started at Mon Mar 26 17:46:15 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:15 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:46:16 EDT 2012 ssl.sh: #4240: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7376 at Mon Mar 26 17:46:16 EDT 2012 kill -USR1 7376 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7376 killed at Mon Mar 26 17:46:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:46:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7451 >/dev/null 2>/dev/null selfserv_9280 with PID 7451 found at Mon Mar 26 17:46:16 EDT 2012 selfserv_9280 with PID 7451 started at Mon Mar 26 17:46:16 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:46:17 EDT 2012 ssl.sh: #4241: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7451 at Mon Mar 26 17:46:17 EDT 2012 kill -USR1 7451 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7451 killed at Mon Mar 26 17:46:17 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:46:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7527 >/dev/null 2>/dev/null selfserv_9280 with PID 7527 found at Mon Mar 26 17:46:17 EDT 2012 selfserv_9280 with PID 7527 started at Mon Mar 26 17:46:17 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:17 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:46:17 EDT 2012 ssl.sh: #4242: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7527 at Mon Mar 26 17:46:17 EDT 2012 kill -USR1 7527 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7527 killed at Mon Mar 26 17:46:17 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:46:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7603 >/dev/null 2>/dev/null selfserv_9280 with PID 7603 found at Mon Mar 26 17:46:17 EDT 2012 selfserv_9280 with PID 7603 started at Mon Mar 26 17:46:17 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:17 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:46:18 EDT 2012 ssl.sh: #4243: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7603 at Mon Mar 26 17:46:18 EDT 2012 kill -USR1 7603 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7603 killed at Mon Mar 26 17:46:18 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:46:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7679 >/dev/null 2>/dev/null selfserv_9280 with PID 7679 found at Mon Mar 26 17:46:18 EDT 2012 selfserv_9280 with PID 7679 started at Mon Mar 26 17:46:18 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:18 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:46:18 EDT 2012 ssl.sh: #4244: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7679 at Mon Mar 26 17:46:18 EDT 2012 kill -USR1 7679 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7679 killed at Mon Mar 26 17:46:18 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:46:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:46:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 7755 >/dev/null 2>/dev/null selfserv_9280 with PID 7755 found at Mon Mar 26 17:46:18 EDT 2012 selfserv_9280 with PID 7755 started at Mon Mar 26 17:46:18 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:46:18 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:46:19 EDT 2012 ssl.sh: #4245: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 7755 at Mon Mar 26 17:46:19 EDT 2012 kill -USR1 7755 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 7755 killed at Mon Mar 26 17:46:19 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) TIMESTAMP ssl END: Mon Mar 26 17:46:19 EDT 2012 Running tests for merge TIMESTAMP merge BEGIN: Mon Mar 26 17:46:19 EDT 2012 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/tests.v3.30287 -t Test2 -f ../tests.pw merge.sh: #4246: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id dave --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4247: Merging Dave - PASSED merge.sh: Merging in new user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id server --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4248: Merging server - PASSED merge.sh: Merging in new chain certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id ext_client --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4249: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict1 --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4250: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict2 --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4251: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:30 2012 Not After : Sun Mar 26 21:35:30 2017 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:42:9b:31:3f:84:ed:8c:52:19:aa:00:ef:67:a1:ca: 14:d7:ba:40:d3:64:00:4e:a7:2f:03:6a:f1:fc:ad:20: e3:74:d9:b9:8e:65:1c:af:fa:63:fd:88:4f:20:b7:66: 7f:4b:3b:4d:fc:2a:f7:0d:02:27:43:39:db:9a:2b:50: af:c2:05:ed:a4:5a:8e:af:15:16:8a:d9:a5:e0:10:96: 69:0c:f6:4c:97:b7:31:20:1d:b1:e4:74:80:c4:54:65: c3:7c:79:5b:ce:fe:fb:17:fa:b5:69:21:30:c4:32:df: 49:b0:e3:13:fe:0c:83:50:cd:2f:d7:6e:2e:8a:3a:9b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 03:9e:a6:ff:d0:be:ac:2f:d9:78:fc:7d:05:00:ac:b9: 1e:52:6e:8c:50:c0:b7:16:b2:45:34:44:d8:a4:b3:11: 8a:cc:54:46:cb:98:46:99:e6:bf:35:37:d1:50:8f:9c: d1:fc:14:f3:27:a8:2b:02:14:55:64:ce:c8:55:a9:c4: e5:20:86:ac:bf:03:a7:3f:78:25:10:b0:47:e8:de:00: 4c:ef:8f:48:ee:85:2b:ad:9a:8c:3e:70:35:81:a9:ed: 94:53:fb:db:94:e6:1a:49:c0:ab:47:8d:f9:6b:c9:be: 04:86:4f:cb:40:9d:a9:ee:cf:a8:dc:6b:28:0f:55:82 Fingerprint (MD5): 11:02:36:19:2B:AF:7A:B8:FD:4E:B0:95:45:0B:7B:3E Fingerprint (SHA1): 52:87:72:5E:F0:FC:58:81:8C:EC:03:5A:87:7F:F4:A5:87:B4:91:49 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #4252: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:35:31 2012 Not After : Sun Mar 26 21:35:31 2017 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:24:68:3b:14:43:b0:f9:70:b2:58:c4:10:79:31:b6: 0d:f6:cc:4d:ab:31:5d:b7:4c:fe:8e:0d:f3:4a:af:d6: 58:20:12:00:83:98:7e:5e:4d:52:c7:f5:ba:66:28:e7: ea:cb:03:93:7d:d6:fb:79:2d:e6:1d:ea:1c:ab:d7:1d: 41:b9:0f:b7:0b:60:79:9b:06:8e:d0:ae:2a:3f:f0:31: c6:c5:d2:f8:b1:aa:a9:25:89:ac:63:af:1f:f8:f6:46: 66:ea:12:63:ff:b8:59:65:7a:7a:42:80:23:b7:ec:c4: c9:a5:fb:0f:ad:fd:60:a7:c4:ee:87:77:1a:e4:b4:c1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 55:3b:16:28:a3:6c:aa:19:17:f0:57:c2:bf:50:85:0c: f4:02:f7:06:0f:a5:69:d1:f8:6b:39:78:01:0a:65:f8: eb:7e:b3:e9:9e:10:81:7d:f1:6d:7f:f2:d5:ad:c3:97: 20:d0:00:c9:b7:6f:87:bd:77:b1:86:a1:69:fb:71:b6: ea:06:32:f7:e5:78:66:ee:8c:76:8a:57:0b:63:2e:b3: b3:df:31:4c:a3:b7:1b:b4:d2:55:7d:f1:fe:29:9d:f3: a5:bb:d6:02:01:40:73:12:62:d7:ef:45:26:24:71:a4: e4:6d:f3:ef:32:cb:d8:62:bc:f5:bb:e6:a2:05:62:a4 Fingerprint (MD5): B2:FD:E9:12:92:F7:E5:A3:AE:1F:26:E9:5B:5A:B9:68 Fingerprint (SHA1): BD:0E:28:88:83:67:65:A7:91:89:2A:88:B3:43:BA:E5:B9:D2:83:B2 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #4253: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id sdr --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4254: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI Alice u,u,u bob@bogus.com ,, Dave u,u,u eve@bogus.com ,, TestCA CT,C,C localhost.localdomain u,u,u localhost-sni.localdomain u,u,u clientCA T,C,C chain-2-clientCA ,, ExtendedSSLUser u,u,u serverCA C,C,C chain-1-clientCA ,, Alice #1 ,, Alice #2 ,, Alice #99 ,, Alice #3 ,, Alice #100 ,, Alice #4 ,, CRL names CRL Type TestCA CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/tests.v3.30287 -t Test2 -f ../tests.pw merge.sh: #4255: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/upgradedb/tests.v1.30287 -t Test1 -f ../tests.pw merge.sh: #4256: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #4257: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #4258: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #4259: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Mon Mar 26 21:35:37 2012 Entry (1): Serial Number: 40 (0x28) Revocation Date: Mon Mar 26 21:35:15 2012 Entry Extensions: Name: CRL reason code Entry (2): Serial Number: 42 (0x2a) Revocation Date: Mon Mar 26 21:35:35 2012 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #4260: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Mon Mar 26 17:46:22 EDT 2012 merge.sh: Testing with shared library =============================== Running tests for cert TIMESTAMP cert BEGIN: Mon Mar 26 17:46:22 EDT 2012 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #4261: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -f ../tests.pw cert.sh: #4262: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4263: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4264: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #4265: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA -f ../tests.pw cert.sh: #4266: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4267: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4268: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #4269: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4270: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #4271: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4272: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #4273: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA -f ../tests.pw cert.sh: #4274: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4275: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4276: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #4277: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4278: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #4279: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4280: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #4281: Exporting Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw cert.sh: #4282: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4283: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4284: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #4285: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #4286: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #4287: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #4288: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA.ca.cert cert.sh: #4289: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA.ca.cert cert.sh: #4290: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw cert.sh: #4291: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4292: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4293: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #4294: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser.cert cert.sh: #4295: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #4296: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #4297: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA.ca.cert cert.sh: #4298: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA.ca.cert cert.sh: #4299: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw cert.sh: #4300: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4301: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA.ca.cert cert.sh: #4302: Import Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4303: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #4304: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser.cert cert.sh: #4305: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #4306: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4307: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA.ca.cert cert.sh: #4308: Import Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4309: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #4310: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #4311: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4312: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #4313: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain.cert cert.sh: #4314: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #4315: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw cert.sh: #4316: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4317: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA.ca.cert cert.sh: #4318: Import Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4319: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #4320: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice.cert cert.sh: #4321: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw cert.sh: #4322: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4323: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA.ca.cert cert.sh: #4324: Import Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4325: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #4326: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob.cert cert.sh: #4327: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw cert.sh: #4328: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4329: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA.ca.cert cert.sh: #4330: Import Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4331: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #4332: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave.cert cert.sh: #4333: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw cert.sh: #4334: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4335: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA.ca.cert cert.sh: #4336: Import Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4337: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #4338: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve.cert cert.sh: #4339: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #4340: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #4341: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #4342: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #4343: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #4344: Import Eve's cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw cert.sh: #4345: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4346: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #4347: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... cert.sh: #4348: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw cert.sh: #4349: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4350: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #4351: Import Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4352: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #4353: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt.cert cert.sh: #4354: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:f2 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:46:47 2012 Not After : Tue Jun 26 21:46:47 2012 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:fa:dc:cd:42:be:45:5a:d0:b3:da:d0:2c:ea:e7:c7: 77:6b:4f:7b:3e:fe:51:05:16:0e:7c:3a:3d:5f:20:a5: 95:4b:25:45:09:8b:83:60:07:a8:cb:92:04:d5:f2:df: 2a:7a:d1:68:2e:67:f8:6e:b4:be:ed:49:b8:c7:1f:26: 90:54:5a:da:52:29:d0:70:36:f0:7b:83:df:86:75:f4: 4b:d4:61:c8:88:81:93:e9:27:4b:a1:50:21:2d:c0:53: 23:4b:31:5c:e3:b9:c0:69:c5:2b:c9:d4:ce:17:88:52: 03:f1:65:f6:8c:ee:69:76:48:5d:b7:1b:c1:5e:7a:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 03:28:da:73:7f:ba:e9:40:9b:72:a1:00:f0:29:80:34: 63:5b:59:4d:5a:df:39:7a:19:6e:4c:c8:ae:73:7c:94: 03:e2:84:5b:fa:64:75:27:87:0b:fc:b5:43:7f:96:38: a7:8e:49:9b:0b:b3:1d:9f:4d:85:c3:f0:14:bf:22:7a: 9b:c8:d8:e8:54:ba:fb:e3:f3:8d:07:cc:13:10:60:54: b5:fc:fc:cb:c8:98:ac:45:ab:b1:1c:80:23:6b:a8:51: d0:14:e4:6a:1e:36:dc:86:c8:5a:27:ce:ff:ab:56:44: cf:35:32:48:f2:a2:94:3b:c2:9f:eb:18:87:d7:28:6e Fingerprint (MD5): 1D:BC:FA:88:BD:8E:EE:B6:94:5A:C7:F3:0F:80:71:22 Fingerprint (SHA1): F5:39:C7:FB:BB:E9:A1:6C:28:4A:B9:AD:3B:F5:74:79:56:51:EA:77 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4355: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:f4 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:46:47 2012 Not After : Tue Jun 26 21:46:47 2012 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:3f:d6:05:36:49:26:b3:73:ee:cb:aa:63:3c:26:2d: fc:e3:dd:ca:ba:38:c0:c9:e5:50:17:23:bb:82:dd:26: 05:71:ac:46:06:c3:32:96:b7:43:01:1a:d0:e8:85:21: ef:f2:a9:fd:29:f8:c5:df:69:6b:91:b3:02:70:3b:a0: 54:6e:dc:b7:b6:99:e3:15:82:f1:89:5b:50:ea:ae:42: ab:ab:0a:3c:64:66:a5:4c:ad:36:c4:c9:c1:57:f7:23: 4b:30:82:f3:fc:b2:af:7c:f4:55:ff:8f:42:26:98:a7: 9e:a3:32:f6:d6:54:96:81:c5:04:5f:c2:6a:c6:c2:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 83:a8:8f:81:5a:9a:a8:7f:88:16:b1:bf:9a:2d:68:a6: 60:f5:d6:c8:ab:72:96:d1:84:27:43:5c:5c:96:c6:7a: 04:ac:09:3c:15:d1:84:dc:35:01:2a:fb:22:1d:9a:31: db:42:45:65:cc:62:1d:0c:93:e4:64:57:70:8d:61:31: ef:fd:cb:9b:30:91:01:56:cc:6a:86:52:28:ca:7d:98: 9f:58:88:6f:65:37:31:11:4d:b3:e5:b4:1d:66:3e:6b: 1b:41:79:19:b4:20:c9:f3:d4:74:04:5c:8c:d3:84:f0: 0f:57:1b:8a:34:c6:99:53:1f:b5:00:b2:f4:88:ec:39 Fingerprint (MD5): D8:6E:24:C8:45:D9:8A:8D:2D:19:18:E0:69:14:DB:32 Fingerprint (SHA1): ED:48:7E:4E:C0:9C:46:59:3C:D6:D9:F4:1D:DC:98:BD:97:1D:A8:E5 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4356: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:f5 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:46:48 2012 Not After : Tue Jun 26 21:46:48 2012 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:2a:32:6b:79:9b:37:3f:36:65:79:b5:3a:be:aa:48: b8:77:ed:9c:0b:d9:22:fe:0b:b7:f8:a9:f7:1a:ae:18: fc:04:55:da:7d:2f:ac:32:32:2a:67:03:29:48:41:57: 59:a3:04:ca:30:3d:be:c4:01:1e:42:20:22:d3:78:74: 2a:eb:0d:92:ee:dc:6a:82:6f:69:b7:a2:5a:33:a3:6f: 27:93:50:e5:23:f3:d0:1c:0c:86:73:b5:71:a4:00:63: e2:18:a0:f8:31:90:22:36:82:d0:d3:da:3b:9d:ef:7c: ff:8a:8f:f2:1b:51:64:3b:ec:11:a6:d3:81:43:87:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 10:f0:fe:d3:50:23:8d:40:87:63:64:a1:f3:7e:ae:86: ca:3a:54:42:c3:b7:e9:65:df:c6:d5:a5:a2:bc:2c:9f: 46:a9:70:2b:93:67:44:99:a4:db:9b:0a:68:04:67:24: 26:60:de:ba:90:f1:67:4b:7d:c9:5e:a0:76:52:c7:6b: f1:59:90:5a:c0:78:80:a7:e9:95:82:72:b4:a1:f1:91: be:77:c6:48:cf:21:60:3c:3f:49:59:97:b0:84:8d:fb: 84:c6:83:45:4c:f2:8d:c0:2e:93:c9:c8:a6:90:f4:16: c1:c1:9c:6c:c5:37:41:f0:71:be:c4:8b:09:4a:0e:a3 Fingerprint (MD5): 0C:DF:25:08:EF:2F:CA:F9:72:55:4D:6F:91:00:A4:C9 Fingerprint (SHA1): C4:27:7A:07:1E:7B:CE:FB:53:89:04:AB:38:92:5C:FA:DF:6D:2D:BD Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4357: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:f7 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:46:49 2012 Not After : Tue Jun 26 21:46:49 2012 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:52:8a:9e:5d:6c:b1:cb:63:a3:04:b1:2c:f5:46:13: 71:26:df:da:d2:67:ca:87:65:bf:05:ba:8e:30:97:74: a0:2f:80:20:8d:76:ae:2b:80:0e:ef:2a:a9:40:62:ce: c6:7f:3a:0f:3e:62:f9:aa:64:2b:8a:b8:c5:9d:51:1d: 33:29:16:64:ef:b2:6d:84:77:bb:d3:3a:6d:e3:72:1f: 73:7e:f9:a9:ea:fd:7c:91:28:0d:bc:7d:d0:96:3e:c5: 8c:18:77:f5:fa:7a:87:be:77:0f:f2:f1:db:db:ba:d9: e6:3a:35:b2:43:4b:a3:db:7c:94:b2:e9:54:15:60:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b3:6e:ec:7c:18:06:f5:55:cc:cf:c7:0c:95:2c:f9:66: ba:34:81:53:92:e9:a4:e8:80:e8:ac:64:e1:04:ae:69: bd:9f:28:80:c0:6e:8d:76:9d:20:f5:a2:3f:db:ee:ae: 1b:14:3f:b1:1a:bd:88:b9:da:30:ba:ca:40:db:3c:6f: dd:b2:e1:25:2a:75:b7:f3:9e:22:ff:f1:09:8e:77:fc: c5:2f:bd:e0:6d:13:7a:44:70:c1:e6:f3:ba:9b:41:dc: 15:7e:c0:6b:5a:5d:df:c6:35:b2:2c:57:cf:0d:24:c8: 54:af:1a:bf:e5:fa:f0:f0:21:50:33:6c:a6:e7:b6:18 Fingerprint (MD5): E9:F8:74:64:DD:6E:7B:8E:32:C9:40:EC:6C:CD:EE:26 Fingerprint (SHA1): 24:97:EB:AF:A5:7A:43:31:AA:35:AD:48:C1:97:77:61:69:0B:48:6C Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4358: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:f9 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:46:50 2012 Not After : Tue Jun 26 21:46:50 2012 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:80:42:d8:6c:71:f2:da:da:c7:30:2f:cb:5f:e5:ae: 5d:dd:91:93:00:b7:e2:49:26:53:b6:5d:a4:73:9b:80: a1:40:6f:bc:8c:b8:05:ee:2f:9a:8f:63:4a:d7:59:58: f8:06:da:e8:83:b3:85:76:ad:a4:51:c9:61:45:99:df: f7:ea:11:13:5d:78:6d:6b:8d:47:32:79:46:92:c5:cb: ef:18:ee:43:c9:8c:74:de:7e:fb:9a:5f:3f:b7:72:25: 1d:f3:8e:87:f7:ef:41:49:36:34:7a:9d:02:b6:4c:93: fe:fc:0f:ce:78:60:78:43:85:31:ca:07:58:91:25:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 62:92:c8:84:f3:14:a9:7c:d8:cf:dc:63:59:fa:33:17: 97:9b:00:13:cf:90:1e:ab:4e:76:17:cc:7d:87:2f:e0: 18:75:a4:62:7c:11:5f:22:12:12:62:86:d6:c0:71:45: f4:cb:ec:8e:1c:7d:2d:42:5a:82:49:8b:14:fa:de:cb: b8:06:92:d0:cb:c1:5e:47:71:29:93:43:23:a1:71:24: 9c:f0:f3:ab:fd:86:a7:91:d8:bc:e3:54:99:07:96:ea: 6f:40:34:fc:f7:1e:6d:61:12:d4:ba:88:e1:b5:ee:b8: 0a:26:4e:3f:ca:3e:64:a1:e0:95:95:f0:54:c5:4d:b3 Fingerprint (MD5): 05:34:5D:06:08:C3:71:FF:BB:1D:C7:5B:7B:40:77:C3 Fingerprint (SHA1): 0D:17:73:11:0B:D1:38:D8:0A:D6:A0:67:DC:AF:AC:B2:FF:B1:A4:1B Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4359: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:fa Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:46:51 2012 Not After : Tue Jun 26 21:46:51 2012 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:65:2d:df:37:c2:56:b4:d9:6b:ad:97:66:b6:f9:6e: e0:74:a2:a0:2b:f5:98:96:5d:3f:1a:15:6b:a2:84:f6: 05:34:5e:4f:b5:7f:cc:e3:68:78:f9:cd:74:02:99:9d: 33:6d:88:6a:23:62:df:c0:b8:51:ad:20:6b:18:09:63: 51:d5:be:46:ec:dc:22:dd:e1:0c:06:dc:55:37:d2:4b: 6a:8b:5c:d4:b0:b8:8a:fa:68:46:96:62:54:9f:26:1f: 0c:42:a6:42:a1:ef:d8:90:74:95:33:b3:7f:4b:c7:46: 86:4f:0e:44:c6:04:c1:05:2d:33:bd:7a:02:76:d1:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 05:71:e5:67:36:6b:cf:39:26:19:60:f5:c3:d0:7c:71: 0f:42:5e:71:0b:56:89:cd:5b:c2:55:e4:cd:79:bf:7e: 47:01:9e:cd:da:ad:2f:fa:84:4b:fa:d1:3b:8c:92:72: 4c:84:9b:c9:a2:dc:f7:ac:8a:4d:f8:6a:49:74:50:cb: e6:f7:13:1d:6d:a0:81:79:2c:20:e7:65:a7:3f:62:55: cd:af:81:49:4c:8c:77:32:e1:ec:3b:51:b2:cc:c1:5a: e7:0b:54:3c:bd:e1:00:78:4d:be:6b:c3:4b:b3:35:fe: 84:04:a2:77:15:94:45:6b:3d:6d:b1:10:1e:44:7c:90 Fingerprint (MD5): 3A:6D:B0:A8:EE:74:41:04:83:75:10:BC:01:AC:D8:3F Fingerprint (SHA1): D2:CA:39:14:79:24:97:D0:EA:8D:35:1A:62:58:5B:17:D7:24:4E:9B Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4360: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:fd Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:46:52 2012 Not After : Tue Jun 26 21:46:52 2012 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:e2:89:30:b4:9b:7a:09:73:e7:38:f8:d1:23:18:cd: 92:68:8c:39:e1:c0:d4:a7:b0:02:ee:13:90:bd:60:94: 30:53:ca:c7:53:0f:28:b9:b5:08:4c:66:c6:1e:ca:14: e5:41:50:76:d1:74:26:62:63:f5:1e:54:45:3f:e1:eb: 0e:7b:e0:f4:f8:19:8e:06:36:08:e9:04:dc:49:7c:f9: 25:c8:1e:2b:48:00:4f:b9:fe:40:2f:e2:a1:32:2c:fc: 79:3c:30:a3:62:15:9f:a0:a4:88:d2:f8:f0:de:b5:a5: 20:c0:7c:31:12:6d:89:72:70:7d:8b:9d:db:94:bf:17 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 04:2e:32:ce:5d:92:4c:55:e7:00:26:d1:1b:01:c3:ae: 6f:4c:4a:ec:a1:50:64:ee:19:ae:2f:0d:76:65:a6:5d: e0:b2:ad:f7:1a:95:b3:6c:05:d2:78:d9:b9:8c:58:29: a2:4b:2a:9e:a7:de:32:ef:4a:ba:49:76:e9:c0:5e:5d: 72:45:50:6a:9d:1f:8c:c6:34:b5:56:40:bc:53:03:1f: 28:0c:13:a2:0b:0a:22:1c:19:7f:84:76:28:0c:eb:d8: 51:00:9c:c3:c2:16:07:4c:64:fd:68:9e:5c:33:f1:f4: 7c:c8:69:b0:e1:d2:10:ea:46:12:0c:21:90:ec:0e:d2 Fingerprint (MD5): D6:77:FC:36:48:3C:29:14:A6:CA:DC:6C:E2:46:81:62 Fingerprint (SHA1): 89:9D:A2:CE:9C:53:FE:4C:62:2F:63:11:46:68:CC:2D:C1:C8:86:15 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4361: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:89:fe Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:46:53 2012 Not After : Tue Jun 26 21:46:53 2012 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:0a:97:99:5a:d5:14:5c:cf:2e:f8:82:4d:d6:99:27: de:38:1d:c7:91:c0:15:0e:13:b5:18:db:99:07:61:42: e3:3a:66:09:4c:eb:81:6c:cc:f4:22:d5:92:30:1c:7d: 6d:d1:43:31:ca:1e:a8:47:1c:5a:94:d2:9d:16:58:08: 54:e0:18:2d:0d:1d:09:35:1a:25:d5:f6:e5:58:e2:63: 13:d4:a0:aa:70:b1:d3:6c:77:00:63:32:c6:8a:6d:f2: b9:44:0d:80:30:11:89:7a:aa:48:2f:05:52:df:6b:b0: 0e:2d:17:6d:b1:78:37:d0:e8:8e:e6:36:07:52:98:71 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 76:63:31:70:4d:4a:f0:c1:27:b6:77:54:20:53:72:d0: 77:2a:33:64:65:0b:82:b4:6a:c3:9b:db:55:a6:c9:bd: 1e:64:16:2a:37:23:38:9b:c5:5d:16:83:98:df:f5:0e: d9:4e:df:c0:c5:ab:61:db:b4:45:48:e9:f9:01:0b:aa: 1c:3e:e2:d1:e5:f8:a9:38:af:74:22:37:ac:05:c1:b6: 7e:8b:76:a2:e9:e9:84:6b:c4:b0:c5:7e:d1:95:ef:df: ad:84:6b:c2:1b:ee:48:57:65:ee:c7:71:b4:8d:ee:9c: e6:ee:3a:e7:88:b9:30:e1:30:27:e1:0e:34:f4:8a:34 Fingerprint (MD5): 70:1F:43:23:70:A5:2C:39:BA:21:EE:3B:76:0C:F3:F7 Fingerprint (SHA1): 74:0B:70:AB:29:E4:BA:5C:91:7C:BE:80:21:A2:90:65:48:8F:16:6A Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4362: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:8a:00 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:46:54 2012 Not After : Tue Jun 26 21:46:54 2012 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:de:e0:04:5f:0e:c9:0d:85:98:61:cf:11:c9:f8:93: 03:b1:35:aa:25:64:3c:65:d6:a4:fb:a9:4c:ca:58:ce: 61:65:90:d9:81:53:16:a0:c8:55:1c:6a:4b:54:0d:d7: 50:f4:e6:b4:a6:c9:19:6d:8a:1f:e2:9e:36:52:65:7b: 0c:af:12:8e:44:d4:36:80:22:20:6d:64:c3:db:6a:1b: f0:f4:bc:a2:f5:a3:35:3c:56:e3:70:c4:6a:2b:77:d0: c3:98:ec:60:cd:08:cf:14:f1:b8:a5:c9:f4:de:ad:0b: 7c:8c:12:61:6a:e4:55:df:fb:e8:2a:da:5f:4d:3d:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 08:a8:d9:de:57:13:60:2c:ce:55:d1:46:8a:b7:72:b9: ba:07:2f:c0:3e:67:ef:70:e3:a0:99:8c:57:61:d0:0b: 3e:8c:e3:4b:44:69:4d:fd:4f:6c:b4:99:de:dc:e7:08: e4:00:7b:22:fc:54:f9:80:17:e0:d1:28:1c:df:6c:d4: bd:c1:f4:8e:a9:76:c9:8c:72:c6:7e:81:13:fb:17:d9: ea:3f:b2:07:3f:23:b7:05:7e:41:90:55:90:54:74:a8: d0:83:79:1e:8b:df:08:38:5d:16:31:a0:8b:fc:c4:5d: b7:2d:48:93:67:5f:b6:9a:07:05:b7:11:f1:8b:21:5e Fingerprint (MD5): 0A:86:F2:4F:7D:C1:3F:40:88:35:57:96:25:36:53:6E Fingerprint (SHA1): 5A:45:99:7C:68:90:A0:E0:55:69:EB:50:7E:09:CC:D2:30:18:34:1E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4363: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:8a:02 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:46:55 2012 Not After : Tue Jun 26 21:46:55 2012 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:2d:06:7b:77:bf:f5:10:c1:3f:67:01:21:b3:86:04: 3c:de:44:7c:af:32:a6:4d:96:fd:ea:b7:b1:fc:c4:96: 98:6f:ba:8f:46:33:37:15:a3:67:13:ce:2a:c9:2e:5e: 8a:2b:2e:10:bc:8c:8d:d8:0f:4b:60:32:1a:01:9e:0d: 39:3b:96:20:94:e8:db:f9:44:31:93:86:92:e2:76:ab: 7d:dc:c8:57:b8:e9:43:8a:34:1f:b5:c2:04:de:27:ca: c3:8b:f7:21:17:79:8f:75:dc:3e:a6:03:f5:cc:08:7b: 3c:b9:01:5b:f1:ee:76:d0:78:65:53:55:17:69:98:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8d:ca:0e:10:2e:71:27:f6:76:9f:bc:06:59:f3:c9:3e: 03:b3:a8:65:fe:9c:90:3f:b5:77:72:fd:7d:61:77:2c: 96:71:d1:3c:29:c8:cf:dd:1d:bb:e9:79:20:fe:be:82: 11:33:66:8f:ce:9f:56:87:26:6b:01:58:8a:45:b3:c9: d5:6a:08:a0:1f:91:63:a5:12:fd:47:4d:0d:9f:03:65: b0:b2:ef:c7:e0:b5:c4:44:d8:21:44:67:1c:74:be:36: bf:32:60:30:3c:b5:60:e9:ee:e1:87:c1:6d:14:38:16: 37:f7:4a:44:ec:b5:bc:0a:c2:bb:0a:9f:3f:89:06:a0 Fingerprint (MD5): 40:B2:59:64:54:F1:2E:91:19:FC:65:E7:43:5E:B5:EF Fingerprint (SHA1): F8:08:B9:88:42:1C:7D:A1:65:91:A9:7A:79:33:76:5A:61:CD:4D:0A Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4364: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:97:85:8a:04 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Mar 26 21:46:56 2012 Not After : Tue Jun 26 21:46:56 2012 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:10:df:ca:11:cd:d8:8f:b9:2d:2f:aa:8e:a4:db:8f: 9b:c3:c3:18:0c:f8:e5:4b:6f:bd:87:22:0c:fd:74:a8: 6d:fd:c6:8c:19:cc:8a:6f:27:b8:d2:38:5b:d1:4a:e1: 55:b0:1b:95:60:62:75:3c:d4:4c:16:a0:56:6c:65:46: 80:95:f6:9d:a7:fb:80:10:a4:b5:af:11:bf:55:f2:22: 3d:70:c0:30:62:50:97:88:96:85:3d:42:de:75:f2:80: 19:85:e5:24:54:31:88:f9:b5:b1:f2:81:64:3d:1e:cb: 98:7b:28:78:74:a6:3a:82:7a:c3:e2:04:c0:8d:f9:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 4a:08:c7:cc:f3:f7:70:24:41:b3:71:37:a0:0a:f5:02: 4a:1e:d0:5c:e4:ff:4d:ee:7b:ee:a7:22:fb:d8:e3:5a: 5b:78:eb:60:d1:d2:74:b8:4a:69:2f:ee:e2:1a:c7:29: be:d9:3d:f3:2f:dd:86:42:57:16:70:a4:33:36:bf:e9: 89:5c:78:74:aa:13:c2:31:49:97:76:7b:de:c1:e1:9b: b9:d0:82:55:96:8e:cb:4b:4e:a9:0d:50:38:53:6c:e9: 58:17:c1:05:94:f3:b0:fa:74:c5:d7:c7:f3:ed:55:4e: 6b:24:cf:32:03:a3:5b:c3:9c:ec:59:7b:ee:4d:a8:9e Fingerprint (MD5): E8:10:7A:E6:83:40:79:7F:09:B8:D5:04:FC:9A:3C:A0 Fingerprint (SHA1): B2:2D:91:1F:5C:6D:3D:1D:18:E3:07:8E:87:6B:31:15:78:DD:9F:0B Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4365: Certificate Key Usage Extension (11) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw cert.sh: #4366: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4367: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4368: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dbpass -o root.cert cert.sh: #4369: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #4370: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... cert.sh: #4371: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #4372: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #4373: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4374: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA.ca.cert cert.sh: #4375: Import Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4376: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #4377: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted.cert cert.sh: #4378: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #4379: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4380: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #4381: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #4382: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4383: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: `./req' and `/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #4384: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert cert.sh: #4385: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #4386: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #4387: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #4388: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #4389: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #4390: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #4391: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4392: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4393: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4394: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4395: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #4396: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4397: Verify Distrusted Cert for Object Signer - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4398: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #4399: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40.cert cert.sh: #4400: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4401: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #4402: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41.cert cert.sh: #4403: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4404: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #4405: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42.cert cert.sh: #4406: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4407: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #4408: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43.cert cert.sh: #4409: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4410: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #4411: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44.cert cert.sh: #4412: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4413: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #4414: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45.cert cert.sh: #4415: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4416: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #4417: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46.cert cert.sh: #4418: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4419: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #4420: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47.cert cert.sh: #4421: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4422: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #4423: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48.cert cert.sh: #4424: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4425: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #4426: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49.cert cert.sh: #4427: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4428: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #4429: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50.cert cert.sh: #4430: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4431: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #4432: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51.cert cert.sh: #4433: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4434: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #4435: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52.cert cert.sh: #4436: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #4437: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #4438: Modify CRL by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #4439: Modify CRL by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #4440: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #4441: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: No matching CRL was found. cert.sh: #4442: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #4443: Importing CRL for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Mon Mar 26 17:47:24 EDT 2012 Running tests for dbtests TIMESTAMP dbtests BEGIN: Mon Mar 26 17:47:24 EDT 2012 ./dbtests.sh: line 206: syntax error near unexpected token `then' ./dbtests.sh: line 206: ` if [[ $EUID -ne 0 ]] then' TIMESTAMP dbtests END: Mon Mar 26 17:47:24 EDT 2012 Running tests for tools TIMESTAMP tools BEGIN: Mon Mar 26 17:47:24 EDT 2012 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4444: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1a:b7:03:ec:a0:dd:96:1b:7c:ef:2b:b2:bf:a6:e6:97 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4445: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4446: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4447: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 94:1a:bd:cf:f6:75:61:99:ca:fa:b1:f3:5f:90:c4:ae Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4448: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4449: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4450: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 2a:58:eb:22:79:b3:af:22:4c:4e:e7:37:fe:21:2b:2d Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4451: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4452: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4453: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 69:12:33:fe:c3:ac:d3:5c:34:a2:d3:fc:76:4c:7e:d0 Iteration Count: 1 (0x1) tools.sh: #4454: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4455: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4456: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6b:bb:78:e8:3a:2e:48:90:f0:0f:ba:73:30:80:33:0d Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4457: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4458: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4459: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b9:41:24:ef:6d:ee:33:1c:b9:4c:b9:5d:c7:f7:cd:6b Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4460: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4461: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4462: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c0:55:3e:50:f7:c6:06:46:b1:b2:d9:f4:b1:a0:72:db Iteration Count: 1 (0x1) tools.sh: #4463: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4464: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4465: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8c:d5:13:3f:1c:f6:96:6d:9a:2b:40:ab:1c:01:34:95 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:86:44:16:be:88:6c:45:af:89:bb:be:6f:97:bf: ac:d6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4466: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4467: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4468: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6d:eb:8e:c0:ef:72:b9:a2:fb:af:d1:84:f6:6e:26:10 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:b0:69:dc:55:84:b1:2a:f9:69:ed:0b:75:8f:e4: 1b:7e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4469: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4470: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4471: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c6:d8:e2:aa:6e:7a:cf:99:66:20:93:8a:16:4b:fa:66 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:f8:8b:5a:64:22:d6:c2:56:0c:31:90:4c:dd:16: 8a:1d tools.sh: #4472: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4473: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4474: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4b:9e:d5:88:09:50:a5:ad:b0:27:9a:22:4a:d4:ae:f3 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:f8:98:98:0e:4b:96:7c:b3:6c:d2:40:73:c0:cf: 49:9c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4475: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4476: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4477: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 16:01:98:97:53:03:0c:f0:5a:53:d5:87:1d:36:f8:0e Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:f2:e4:67:de:07:29:3c:96:62:a2:11:f2:c8:f2: 55:e8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4478: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4479: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4480: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 61:e0:0c:90:61:7f:93:b5:0c:92:dc:de:26:dc:d3:ee Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:a5:48:54:06:eb:38:bc:e5:87:8b:b2:c3:fa:5e: a3:ce tools.sh: #4481: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4482: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4483: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 17:99:2a:ac:92:3c:b4:fa:d2:6d:89:c6:0e:11:6f:0d Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:7d:e9:6d:21:ae:ba:90:47:17:fa:17:7c:68:a0: 05:a5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4484: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4485: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4486: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b7:4f:5f:88:38:e2:8c:a2:9e:03:96:24:cc:74:c0:32 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:10:2f:47:f9:ea:99:58:ac:28:8e:a3:ad:76:84: 7c:09 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4487: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4488: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4489: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4e:3d:e8:87:3b:ab:5a:9c:cb:69:9e:ec:62:f3:61:41 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:08:f3:ee:5e:2d:c8:1b:b8:13:23:80:4f:29:a2: 60:8f tools.sh: #4490: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4491: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4492: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 27:dc:83:df:81:28:fe:fc:00:e0:58:75:70:ae:9c:1f Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:91:5e:73:be:11:f6:ac:de:32:8e:c8:a1:20:af: ff:86 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4493: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4494: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4495: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d2:fd:3a:0a:11:86:e3:db:23:01:47:82:9b:a6:6c:bd Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:06:6f:4b:ee:1d:3a:63:55:a7:50:e9:4b:0e:15: 04:36 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4496: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4497: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4498: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9f:24:91:9a:c8:00:1b:88:a4:43:3a:8f:f1:98:45:e9 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:76:69:79:b1:76:60:24:2f:8f:02:38:55:38:d1: 3b:6d tools.sh: #4499: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4500: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4501: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5c:8d:82:85:01:f6:9a:09:c5:ec:9a:ee:2d:a8:94:85 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:e7:55:26:07:6b:4c:b2:67:ca:5d:4a:f0:00:c3: f8:4e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4502: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4503: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4504: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a4:2a:a0:12:91:6a:5a:6f:4a:a5:6e:63:4f:db:c2:32 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:04:48:12:af:16:cd:c2:6b:cd:80:b6:77:03:ed: 3b:6f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4505: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4506: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4507: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: df:93:8e:72:d0:75:84:1b:a3:4c:a0:a3:43:38:04:83 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:ba:4b:6b:d8:3e:04:fd:27:bf:9c:1b:d3:91:f1: 1f:57 tools.sh: #4508: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4509: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4510: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2a:61:bf:45:60:12:27:f4:6f:a7:0e:77:c8:6f:63:25 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:07:52:fa:f9:78:73:6a:08:f9:ab:b2:4f:39:1a: 77:85 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4511: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4512: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4513: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e7:d1:67:7d:75:12:ee:f2:76:4a:21:59:69:08:a4:7d Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:92:83:47:ed:43:3a:b7:fa:20:be:cf:80:7a:bd: 83:89 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4514: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4515: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4516: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 15:40:3b:16:ee:3e:d8:c6:9d:53:d6:0a:4a:86:f8:42 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:f0:83:f1:da:bb:52:25:d1:09:4a:a3:96:60:51: 13:b4 tools.sh: #4517: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4518: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4519: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 5a:1c:e7:fc:ea:be:73:83:c1:3b:0f:1a:22:f0:b1:98 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4520: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4521: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4522: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 98:21:67:79:d8:34:b6:53:9e:b6:a0:bd:39:a8:c2:87 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4523: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4524: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4525: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 13:62:1b:a8:5e:cc:db:56:3d:76:f8:c4:7f:56:81:80 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4526: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4527: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4528: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 3b:2b:d2:e5:4b:59:54:88:29:31:b6:63:67:a9:09:be Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4529: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4530: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4531: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 21:ec:89:10:bd:7f:e4:c0:df:f1:6f:f8:88:36:64:98 Iteration Count: 1 (0x1) tools.sh: #4532: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4533: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4534: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 70:1e:40:7a:e5:50:dc:45:51:6b:0b:07:28:ef:35:00 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4535: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4536: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4537: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 5f:66:9d:43:8e:65:84:34:ab:06:e5:ae:8a:de:46:60 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4538: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4539: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4540: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: b0:ea:47:f3:45:1d:41:eb:4b:8a:78:b5:17:e0:fa:05 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4541: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4542: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4543: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 49:76:7f:c0:21:61:1a:af:84:7c:7a:47:f5:fd:29:e6 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4544: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4545: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4546: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: fe:64:70:dc:bb:cd:97:13:d0:09:86:e5:b2:7b:71:3e Iteration Count: 1 (0x1) tools.sh: #4547: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4548: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 02:67:e0:65:4d:88:11:98:f0:71:17:63:dc:5d:49:b3 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4550: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4551: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4552: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 20:96:da:8f:df:2d:1e:5c:07:6b:1b:4e:8f:0c:e4:34 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4553: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4554: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4555: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 6c:86:2d:d2:88:b2:79:dc:a8:46:da:70:e0:02:e4:29 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4556: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4557: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4558: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ce:06:db:d7:57:d4:39:a1:31:b2:3b:54:34:cd:a0:c7 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4559: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4560: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4561: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3d:69:1c:1e:15:59:c3:16:0e:b9:9d:be:6f:ed:b1:e4 Iteration Count: 1 (0x1) tools.sh: #4562: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4563: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4564: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 30:14:12:e2:cd:57:02:97:a0:c2:a7:92:13:55:2e:45 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4565: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4566: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4567: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a5:48:84:16:6a:aa:d1:a0:9e:bb:f8:45:29:96:d0:7b Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4568: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4569: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4570: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 15:70:16:ad:2a:01:12:72:c0:57:3a:91:5c:0b:b7:b3 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4571: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4572: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4573: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 12:10:03:8a:4b:69:2b:7a:c4:c9:46:4a:f6:51:86:d6 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4574: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4575: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4576: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 38:9e:0e:93:90:32:f0:e0:d2:f2:2a:56:89:e0:bb:bb Iteration Count: 1 (0x1) tools.sh: #4577: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4578: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4579: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a5:83:31:59:7d:7c:3e:55:bd:b9:8a:3f:43:69:35:01 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4580: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4581: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4582: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7b:8f:32:d1:a3:19:cd:2d:80:93:1c:8c:03:6a:c8:71 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4583: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4584: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4585: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 26:60:ec:24:2a:23:79:e5:b4:2f:55:20:c5:22:2c:c9 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4586: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4587: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4588: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b1:32:a0:6a:f9:1d:60:85:0b:6e:30:10:5b:a4:47:e1 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4589: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4590: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4591: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b5:97:b1:f1:95:68:fc:46:98:9a:45:56:d5:43:83:e4 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4592: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4593: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4594: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1b:1f:63:dd:83:54:b7:91:69:3d:20:b0:1d:6d:a6:3f Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4595: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4596: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4597: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8b:d8:d7:f0:1b:13:e4:fb:05:94:bf:ef:fe:07:5f:a3 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4598: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4599: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4600: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 85:c6:3a:c1:43:96:dd:38:f4:1b:21:04:f5:4d:57:0f Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4601: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4602: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4603: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 47:3b:9d:b8:d9:0e:7c:bb:61:65:7c:59:e1:09:b8:4b Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4604: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4605: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4606: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ae:30:55:da:f0:dc:fa:ae:00:37:53:0f:d8:75:4e:95 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:23 2012 Not After : Sun Mar 26 21:46:23 2062 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:9c:f4:c6:8f:05:63:dc:e5:99:46:9e:de:ea:85:34: 7c:e1:4a:ad:13:b7:36:48:78:be:05:27:10:11:40:9e: 44:d4:cb:41:35:ad:20:4a:cf:9c:4a:de:91:dc:47:ae: 93:65:bf:49:04:c7:0f:83:e2:fd:8a:d0:1b:79:d0:71: db:31:95:48:d3:38:b3:d6:e6:ce:f0:4c:02:3b:1a:a7: e9:18:f1:19:ca:13:34:6f:94:ca:7a:fa:6f:d4:9b:1f: 4e:ea:bd:e5:22:c9:c0:27:a3:ab:35:9b:30:2a:06:6c: 16:5e:86:30:02:4f:9c:98:8c:8f:e8:16:99:9c:c3:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 28:2c:6b:9e:4d:59:2f:71:5b:c6:a3:2b:59:ee:d6:57: cf:31:d0:e1:95:9e:d0:2b:0b:fb:f4:63:12:2d:82:61: fd:cc:0a:74:66:89:8b:38:e7:d0:de:f5:b9:d3:57:05: 97:62:ac:14:9b:85:0e:4a:3d:bc:bb:fa:ca:8e:a2:91: e8:f2:8c:28:13:cd:b3:d7:a4:b4:bf:23:2f:26:83:40: fa:df:7c:c9:31:f3:78:ad:91:5e:6e:e5:f0:b9:82:9a: 59:69:24:72:5b:25:2e:75:89:82:42:f2:d0:e4:35:cd: 97:6e:86:f5:de:99:ce:00:e1:c5:0e:17:5c:25:70:96 Fingerprint (MD5): 87:49:C6:4C:93:DD:D1:AE:D1:E7:A9:C0:FA:8B:6D:14 Fingerprint (SHA1): 1D:30:2C:37:39:27:17:98:34:30:4B:AE:09:A9:FB:EE:5B:99:22:55 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:46:38 2012 Not After : Sun Mar 26 21:46:38 2017 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d0:01:7d:f3:f2:9e:8f:49:f9:dc:f2:4a:85:96:c6: 00:11:53:2e:35:bc:8d:c3:38:e2:21:6f:12:8f:85:4b: 00:16:3a:8b:53:db:bf:f2:73:61:d3:e5:09:7c:16:dd: de:c1:55:b7:7c:a0:ff:3d:80:19:60:3f:2d:2b:05:c8: 60:d2:0c:f9:35:9b:a2:c2:e4:fd:21:67:11:1d:1d:95: f4:b2:dc:8d:b2:40:1a:75:2f:93:1f:f3:45:74:90:69: e8:2e:96:c4:55:7d:50:7c:27:6f:49:fb:60:5e:da:5c: 01:e0:52:3c:4d:4c:99:a9:9d:f5:86:67:32:b6:e7:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:0d:c5:27:2e:df:43:ff:31:43:5b:cb:69:02:d7:b6: 9d:07:b5:1e:f5:c2:a4:38:31:bc:a2:09:5e:ce:bc:16: e3:3b:15:f2:7d:0f:46:67:82:1c:75:76:68:90:41:44: 35:f4:c7:29:49:20:a2:1d:e8:39:8d:ba:93:0a:42:17: 5e:83:40:6c:5f:ca:e3:37:72:c2:33:6a:5b:90:52:98: 26:2b:53:f2:74:6f:60:53:a9:ea:db:8c:f7:5c:1b:2a: 39:59:f2:18:03:48:90:08:7b:ce:a9:81:23:5c:f6:17: 60:a1:79:78:ff:db:7a:b5:89:82:f9:32:4c:93:85:3d Fingerprint (MD5): 77:E7:EB:E3:D5:39:EF:F1:A4:50:38:F1:07:00:0E:7F Fingerprint (SHA1): F7:23:0C:0E:E7:B9:48:CE:0F:1A:C8:3D:35:DC:6B:4F:7A:37:CB:AC Friendly Name: Alice tools.sh: #4607: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4608: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": security library: invalid algorithm. tools.sh: #4609: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4610: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #4611: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 55%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 54%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #4612: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #4613: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #4614: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 55%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 54%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #4615: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #4616: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #4617: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Mon Mar 26 17:47:49 EDT 2012 Running tests for fips TIMESTAMP fips BEGIN: Mon Mar 26 17:47:49 EDT 2012 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #4618: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #4619: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 38e6f0106a1a5f987132a8bbb7f56aeb80cc0536 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #4620: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect. fips.sh: #4621: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #4622: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #4623: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #4624: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #4625: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #4626: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #4627: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #4628: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #4629: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #4630: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 38e6f0106a1a5f987132a8bbb7f56aeb80cc0536 FIPS_PUB_140_Test_Certificate fips.sh: #4631: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #4632: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #4633: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #4634: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #4635: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 38e6f0106a1a5f987132a8bbb7f56aeb80cc0536 FIPS_PUB_140_Test_Certificate fips.sh: #4636: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #4637: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #4638: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.3/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x000bcf4d (773965): from 49 (73) to 69 (105) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle dbtest -r -d ../fips fips.sh: #4639: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Mon Mar 26 17:48:05 EDT 2012 Running tests for crmf TIMESTAMP crmf BEGIN: Mon Mar 26 17:48:05 EDT 2012 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #4640: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #4641: CMMF test . - PASSED TIMESTAMP crmf END: Mon Mar 26 17:48:05 EDT 2012 Running tests for smime TIMESTAMP smime BEGIN: Mon Mar 26 17:48:05 EDT 2012 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #4642: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #4643: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #4644: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #4645: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #4646: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #4647: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #4648: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #4649: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #4650: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #4651: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #4652: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #4653: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #4654: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #4655: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #4656: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #4657: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #4658: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #4659: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #4660: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #4661: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #4662: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #4663: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #4664: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #4665: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #4666: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #4667: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #4668: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #4669: Decrypt with a Multiple Email cert . - PASSED smime.sh: #4670: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #4671: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #4672: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #4673: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #4674: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #4675: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #4676: Decode Encrypted-Data . - PASSED smime.sh: #4677: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #4678: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #4679: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #4680: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #4681: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #4682: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Mon Mar 26 17:48:07 EDT 2012 Running tests for ssl TIMESTAMP ssl BEGIN: Mon Mar 26 17:48:07 EDT 2012 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13684 >/dev/null 2>/dev/null selfserv_9280 with PID 13684 found at Mon Mar 26 17:48:08 EDT 2012 selfserv_9280 with PID 13684 started at Mon Mar 26 17:48:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4683: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13684 at Mon Mar 26 17:48:08 EDT 2012 kill -USR1 13684 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13684 killed at Mon Mar 26 17:48:08 EDT 2012 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13740 >/dev/null 2>/dev/null selfserv_9280 with PID 13740 found at Mon Mar 26 17:48:08 EDT 2012 selfserv_9280 with PID 13740 started at Mon Mar 26 17:48:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4684: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13740 at Mon Mar 26 17:48:08 EDT 2012 kill -USR1 13740 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13740 killed at Mon Mar 26 17:48:08 EDT 2012 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13796 >/dev/null 2>/dev/null selfserv_9280 with PID 13796 found at Mon Mar 26 17:48:08 EDT 2012 selfserv_9280 with PID 13796 started at Mon Mar 26 17:48:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4685: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13796 at Mon Mar 26 17:48:09 EDT 2012 kill -USR1 13796 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13796 killed at Mon Mar 26 17:48:09 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13864 >/dev/null 2>/dev/null selfserv_9280 with PID 13864 found at Mon Mar 26 17:48:09 EDT 2012 selfserv_9280 with PID 13864 started at Mon Mar 26 17:48:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4686: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13864 at Mon Mar 26 17:48:09 EDT 2012 kill -USR1 13864 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13864 killed at Mon Mar 26 17:48:09 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13920 >/dev/null 2>/dev/null selfserv_9280 with PID 13920 found at Mon Mar 26 17:48:09 EDT 2012 selfserv_9280 with PID 13920 started at Mon Mar 26 17:48:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4687: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13920 at Mon Mar 26 17:48:10 EDT 2012 kill -USR1 13920 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13920 killed at Mon Mar 26 17:48:10 EDT 2012 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 13976 >/dev/null 2>/dev/null selfserv_9280 with PID 13976 found at Mon Mar 26 17:48:10 EDT 2012 selfserv_9280 with PID 13976 started at Mon Mar 26 17:48:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4688: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 13976 at Mon Mar 26 17:48:10 EDT 2012 kill -USR1 13976 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 13976 killed at Mon Mar 26 17:48:10 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14044 >/dev/null 2>/dev/null selfserv_9280 with PID 14044 found at Mon Mar 26 17:48:10 EDT 2012 selfserv_9280 with PID 14044 started at Mon Mar 26 17:48:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4689: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 14044 at Mon Mar 26 17:48:10 EDT 2012 kill -USR1 14044 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14044 killed at Mon Mar 26 17:48:10 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14100 >/dev/null 2>/dev/null selfserv_9280 with PID 14100 found at Mon Mar 26 17:48:10 EDT 2012 selfserv_9280 with PID 14100 started at Mon Mar 26 17:48:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4690: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14100 at Mon Mar 26 17:48:11 EDT 2012 kill -USR1 14100 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14100 killed at Mon Mar 26 17:48:11 EDT 2012 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:11 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14156 >/dev/null 2>/dev/null selfserv_9280 with PID 14156 found at Mon Mar 26 17:48:11 EDT 2012 selfserv_9280 with PID 14156 started at Mon Mar 26 17:48:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4691: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 14156 at Mon Mar 26 17:48:11 EDT 2012 kill -USR1 14156 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14156 killed at Mon Mar 26 17:48:11 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:11 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14224 >/dev/null 2>/dev/null selfserv_9280 with PID 14224 found at Mon Mar 26 17:48:11 EDT 2012 selfserv_9280 with PID 14224 started at Mon Mar 26 17:48:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4692: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 14224 at Mon Mar 26 17:48:11 EDT 2012 kill -USR1 14224 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14224 killed at Mon Mar 26 17:48:11 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:11 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14280 >/dev/null 2>/dev/null selfserv_9280 with PID 14280 found at Mon Mar 26 17:48:11 EDT 2012 selfserv_9280 with PID 14280 started at Mon Mar 26 17:48:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4693: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 14280 at Mon Mar 26 17:48:12 EDT 2012 kill -USR1 14280 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14280 killed at Mon Mar 26 17:48:12 EDT 2012 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14336 >/dev/null 2>/dev/null selfserv_9280 with PID 14336 found at Mon Mar 26 17:48:12 EDT 2012 selfserv_9280 with PID 14336 started at Mon Mar 26 17:48:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4694: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 14336 at Mon Mar 26 17:48:12 EDT 2012 kill -USR1 14336 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14336 killed at Mon Mar 26 17:48:12 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14404 >/dev/null 2>/dev/null selfserv_9280 with PID 14404 found at Mon Mar 26 17:48:12 EDT 2012 selfserv_9280 with PID 14404 started at Mon Mar 26 17:48:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4695: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 14404 at Mon Mar 26 17:48:12 EDT 2012 kill -USR1 14404 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14404 killed at Mon Mar 26 17:48:12 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14460 >/dev/null 2>/dev/null selfserv_9280 with PID 14460 found at Mon Mar 26 17:48:12 EDT 2012 selfserv_9280 with PID 14460 started at Mon Mar 26 17:48:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4696: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 14460 at Mon Mar 26 17:48:13 EDT 2012 kill -USR1 14460 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14460 killed at Mon Mar 26 17:48:13 EDT 2012 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:13 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14516 >/dev/null 2>/dev/null selfserv_9280 with PID 14516 found at Mon Mar 26 17:48:13 EDT 2012 selfserv_9280 with PID 14516 started at Mon Mar 26 17:48:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4697: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 14516 at Mon Mar 26 17:48:13 EDT 2012 kill -USR1 14516 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14516 killed at Mon Mar 26 17:48:13 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:13 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14584 >/dev/null 2>/dev/null selfserv_9280 with PID 14584 found at Mon Mar 26 17:48:13 EDT 2012 selfserv_9280 with PID 14584 started at Mon Mar 26 17:48:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4698: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 14584 at Mon Mar 26 17:48:13 EDT 2012 kill -USR1 14584 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14584 killed at Mon Mar 26 17:48:13 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:13 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14640 >/dev/null 2>/dev/null selfserv_9280 with PID 14640 found at Mon Mar 26 17:48:13 EDT 2012 selfserv_9280 with PID 14640 started at Mon Mar 26 17:48:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4699: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14640 at Mon Mar 26 17:48:14 EDT 2012 kill -USR1 14640 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14640 killed at Mon Mar 26 17:48:14 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14696 >/dev/null 2>/dev/null selfserv_9280 with PID 14696 found at Mon Mar 26 17:48:14 EDT 2012 selfserv_9280 with PID 14696 started at Mon Mar 26 17:48:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4700: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 14696 at Mon Mar 26 17:48:14 EDT 2012 kill -USR1 14696 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14696 killed at Mon Mar 26 17:48:14 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14764 >/dev/null 2>/dev/null selfserv_9280 with PID 14764 found at Mon Mar 26 17:48:14 EDT 2012 selfserv_9280 with PID 14764 started at Mon Mar 26 17:48:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4701: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14764 at Mon Mar 26 17:48:14 EDT 2012 kill -USR1 14764 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14764 killed at Mon Mar 26 17:48:14 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14820 >/dev/null 2>/dev/null selfserv_9280 with PID 14820 found at Mon Mar 26 17:48:14 EDT 2012 selfserv_9280 with PID 14820 started at Mon Mar 26 17:48:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4702: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14820 at Mon Mar 26 17:48:15 EDT 2012 kill -USR1 14820 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14820 killed at Mon Mar 26 17:48:15 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14876 >/dev/null 2>/dev/null selfserv_9280 with PID 14876 found at Mon Mar 26 17:48:15 EDT 2012 selfserv_9280 with PID 14876 started at Mon Mar 26 17:48:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4703: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14876 at Mon Mar 26 17:48:15 EDT 2012 kill -USR1 14876 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14876 killed at Mon Mar 26 17:48:15 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 14944 >/dev/null 2>/dev/null selfserv_9280 with PID 14944 found at Mon Mar 26 17:48:15 EDT 2012 selfserv_9280 with PID 14944 started at Mon Mar 26 17:48:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4704: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 14944 at Mon Mar 26 17:48:15 EDT 2012 kill -USR1 14944 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 14944 killed at Mon Mar 26 17:48:15 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15000 >/dev/null 2>/dev/null selfserv_9280 with PID 15000 found at Mon Mar 26 17:48:15 EDT 2012 selfserv_9280 with PID 15000 started at Mon Mar 26 17:48:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4705: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15000 at Mon Mar 26 17:48:16 EDT 2012 kill -USR1 15000 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15000 killed at Mon Mar 26 17:48:16 EDT 2012 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15056 >/dev/null 2>/dev/null selfserv_9280 with PID 15056 found at Mon Mar 26 17:48:16 EDT 2012 selfserv_9280 with PID 15056 started at Mon Mar 26 17:48:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4706: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15056 at Mon Mar 26 17:48:16 EDT 2012 kill -USR1 15056 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15056 killed at Mon Mar 26 17:48:16 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15127 >/dev/null 2>/dev/null selfserv_9280 with PID 15127 found at Mon Mar 26 17:48:16 EDT 2012 selfserv_9280 with PID 15127 started at Mon Mar 26 17:48:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4707: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 15127 at Mon Mar 26 17:48:16 EDT 2012 kill -USR1 15127 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15127 killed at Mon Mar 26 17:48:16 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15183 >/dev/null 2>/dev/null selfserv_9280 with PID 15183 found at Mon Mar 26 17:48:16 EDT 2012 selfserv_9280 with PID 15183 started at Mon Mar 26 17:48:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4708: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15183 at Mon Mar 26 17:48:17 EDT 2012 kill -USR1 15183 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15183 killed at Mon Mar 26 17:48:17 EDT 2012 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15239 >/dev/null 2>/dev/null selfserv_9280 with PID 15239 found at Mon Mar 26 17:48:17 EDT 2012 selfserv_9280 with PID 15239 started at Mon Mar 26 17:48:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4709: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 15239 at Mon Mar 26 17:48:17 EDT 2012 kill -USR1 15239 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15239 killed at Mon Mar 26 17:48:17 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15307 >/dev/null 2>/dev/null selfserv_9280 with PID 15307 found at Mon Mar 26 17:48:17 EDT 2012 selfserv_9280 with PID 15307 started at Mon Mar 26 17:48:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4710: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 15307 at Mon Mar 26 17:48:17 EDT 2012 kill -USR1 15307 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15307 killed at Mon Mar 26 17:48:17 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15363 >/dev/null 2>/dev/null selfserv_9280 with PID 15363 found at Mon Mar 26 17:48:17 EDT 2012 selfserv_9280 with PID 15363 started at Mon Mar 26 17:48:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4711: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 15363 at Mon Mar 26 17:48:18 EDT 2012 kill -USR1 15363 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15363 killed at Mon Mar 26 17:48:18 EDT 2012 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15419 >/dev/null 2>/dev/null selfserv_9280 with PID 15419 found at Mon Mar 26 17:48:18 EDT 2012 selfserv_9280 with PID 15419 started at Mon Mar 26 17:48:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4712: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 15419 at Mon Mar 26 17:48:18 EDT 2012 kill -USR1 15419 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15419 killed at Mon Mar 26 17:48:18 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15487 >/dev/null 2>/dev/null selfserv_9280 with PID 15487 found at Mon Mar 26 17:48:18 EDT 2012 selfserv_9280 with PID 15487 started at Mon Mar 26 17:48:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4713: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 15487 at Mon Mar 26 17:48:18 EDT 2012 kill -USR1 15487 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15487 killed at Mon Mar 26 17:48:18 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15543 >/dev/null 2>/dev/null selfserv_9280 with PID 15543 found at Mon Mar 26 17:48:18 EDT 2012 selfserv_9280 with PID 15543 started at Mon Mar 26 17:48:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4714: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 15543 at Mon Mar 26 17:48:18 EDT 2012 kill -USR1 15543 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15543 killed at Mon Mar 26 17:48:18 EDT 2012 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:19 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15599 >/dev/null 2>/dev/null selfserv_9280 with PID 15599 found at Mon Mar 26 17:48:19 EDT 2012 selfserv_9280 with PID 15599 started at Mon Mar 26 17:48:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4715: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 15599 at Mon Mar 26 17:48:19 EDT 2012 kill -USR1 15599 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15599 killed at Mon Mar 26 17:48:19 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:19 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15667 >/dev/null 2>/dev/null selfserv_9280 with PID 15667 found at Mon Mar 26 17:48:19 EDT 2012 selfserv_9280 with PID 15667 started at Mon Mar 26 17:48:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4716: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 15667 at Mon Mar 26 17:48:19 EDT 2012 kill -USR1 15667 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15667 killed at Mon Mar 26 17:48:19 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:19 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15723 >/dev/null 2>/dev/null selfserv_9280 with PID 15723 found at Mon Mar 26 17:48:19 EDT 2012 selfserv_9280 with PID 15723 started at Mon Mar 26 17:48:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4717: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15723 at Mon Mar 26 17:48:19 EDT 2012 kill -USR1 15723 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15723 killed at Mon Mar 26 17:48:19 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:19 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15779 >/dev/null 2>/dev/null selfserv_9280 with PID 15779 found at Mon Mar 26 17:48:20 EDT 2012 selfserv_9280 with PID 15779 started at Mon Mar 26 17:48:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4718: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 15779 at Mon Mar 26 17:48:20 EDT 2012 kill -USR1 15779 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15779 killed at Mon Mar 26 17:48:20 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:20 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15847 >/dev/null 2>/dev/null selfserv_9280 with PID 15847 found at Mon Mar 26 17:48:20 EDT 2012 selfserv_9280 with PID 15847 started at Mon Mar 26 17:48:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4719: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15847 at Mon Mar 26 17:48:20 EDT 2012 kill -USR1 15847 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15847 killed at Mon Mar 26 17:48:20 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:20 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15903 >/dev/null 2>/dev/null selfserv_9280 with PID 15903 found at Mon Mar 26 17:48:20 EDT 2012 selfserv_9280 with PID 15903 started at Mon Mar 26 17:48:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4720: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15903 at Mon Mar 26 17:48:20 EDT 2012 kill -USR1 15903 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15903 killed at Mon Mar 26 17:48:20 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:20 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 15959 >/dev/null 2>/dev/null selfserv_9280 with PID 15959 found at Mon Mar 26 17:48:21 EDT 2012 selfserv_9280 with PID 15959 started at Mon Mar 26 17:48:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4721: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 15959 at Mon Mar 26 17:48:21 EDT 2012 kill -USR1 15959 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 15959 killed at Mon Mar 26 17:48:21 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:21 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16027 >/dev/null 2>/dev/null selfserv_9280 with PID 16027 found at Mon Mar 26 17:48:21 EDT 2012 selfserv_9280 with PID 16027 started at Mon Mar 26 17:48:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4722: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 16027 at Mon Mar 26 17:48:21 EDT 2012 kill -USR1 16027 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16027 killed at Mon Mar 26 17:48:21 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:21 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16083 >/dev/null 2>/dev/null selfserv_9280 with PID 16083 found at Mon Mar 26 17:48:21 EDT 2012 selfserv_9280 with PID 16083 started at Mon Mar 26 17:48:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4723: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 16083 at Mon Mar 26 17:48:21 EDT 2012 kill -USR1 16083 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16083 killed at Mon Mar 26 17:48:21 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:21 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16139 >/dev/null 2>/dev/null selfserv_9280 with PID 16139 found at Mon Mar 26 17:48:21 EDT 2012 selfserv_9280 with PID 16139 started at Mon Mar 26 17:48:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4724: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 16139 at Mon Mar 26 17:48:22 EDT 2012 kill -USR1 16139 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16139 killed at Mon Mar 26 17:48:22 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:22 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16207 >/dev/null 2>/dev/null selfserv_9280 with PID 16207 found at Mon Mar 26 17:48:22 EDT 2012 selfserv_9280 with PID 16207 started at Mon Mar 26 17:48:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4725: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 16207 at Mon Mar 26 17:48:22 EDT 2012 kill -USR1 16207 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16207 killed at Mon Mar 26 17:48:22 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:22 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16263 >/dev/null 2>/dev/null selfserv_9280 with PID 16263 found at Mon Mar 26 17:48:22 EDT 2012 selfserv_9280 with PID 16263 started at Mon Mar 26 17:48:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4726: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 16263 at Mon Mar 26 17:48:22 EDT 2012 kill -USR1 16263 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16263 killed at Mon Mar 26 17:48:22 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:22 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16319 >/dev/null 2>/dev/null selfserv_9280 with PID 16319 found at Mon Mar 26 17:48:23 EDT 2012 selfserv_9280 with PID 16319 started at Mon Mar 26 17:48:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4727: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 16319 at Mon Mar 26 17:48:23 EDT 2012 kill -USR1 16319 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16319 killed at Mon Mar 26 17:48:23 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16387 >/dev/null 2>/dev/null selfserv_9280 with PID 16387 found at Mon Mar 26 17:48:23 EDT 2012 selfserv_9280 with PID 16387 started at Mon Mar 26 17:48:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4728: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 16387 at Mon Mar 26 17:48:23 EDT 2012 kill -USR1 16387 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16387 killed at Mon Mar 26 17:48:23 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16443 >/dev/null 2>/dev/null selfserv_9280 with PID 16443 found at Mon Mar 26 17:48:23 EDT 2012 selfserv_9280 with PID 16443 started at Mon Mar 26 17:48:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4729: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 16443 at Mon Mar 26 17:48:23 EDT 2012 kill -USR1 16443 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16443 killed at Mon Mar 26 17:48:23 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16499 >/dev/null 2>/dev/null selfserv_9280 with PID 16499 found at Mon Mar 26 17:48:24 EDT 2012 selfserv_9280 with PID 16499 started at Mon Mar 26 17:48:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4730: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 16499 at Mon Mar 26 17:48:24 EDT 2012 kill -USR1 16499 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16499 killed at Mon Mar 26 17:48:24 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16567 >/dev/null 2>/dev/null selfserv_9280 with PID 16567 found at Mon Mar 26 17:48:24 EDT 2012 selfserv_9280 with PID 16567 started at Mon Mar 26 17:48:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4731: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 16567 at Mon Mar 26 17:48:24 EDT 2012 kill -USR1 16567 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16567 killed at Mon Mar 26 17:48:24 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16623 >/dev/null 2>/dev/null selfserv_9280 with PID 16623 found at Mon Mar 26 17:48:24 EDT 2012 selfserv_9280 with PID 16623 started at Mon Mar 26 17:48:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4732: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 16623 at Mon Mar 26 17:48:24 EDT 2012 kill -USR1 16623 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16623 killed at Mon Mar 26 17:48:24 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16679 >/dev/null 2>/dev/null selfserv_9280 with PID 16679 found at Mon Mar 26 17:48:25 EDT 2012 selfserv_9280 with PID 16679 started at Mon Mar 26 17:48:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4733: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 16679 at Mon Mar 26 17:48:25 EDT 2012 kill -USR1 16679 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16679 killed at Mon Mar 26 17:48:25 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:25 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16747 >/dev/null 2>/dev/null selfserv_9280 with PID 16747 found at Mon Mar 26 17:48:25 EDT 2012 selfserv_9280 with PID 16747 started at Mon Mar 26 17:48:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4734: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 16747 at Mon Mar 26 17:48:25 EDT 2012 kill -USR1 16747 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16747 killed at Mon Mar 26 17:48:25 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:25 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16805 >/dev/null 2>/dev/null selfserv_9280 with PID 16805 found at Mon Mar 26 17:48:25 EDT 2012 selfserv_9280 with PID 16805 started at Mon Mar 26 17:48:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4735: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 16805 at Mon Mar 26 17:48:25 EDT 2012 kill -USR1 16805 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16805 killed at Mon Mar 26 17:48:25 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:25 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16861 >/dev/null 2>/dev/null selfserv_9280 with PID 16861 found at Mon Mar 26 17:48:26 EDT 2012 selfserv_9280 with PID 16861 started at Mon Mar 26 17:48:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4736: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 16861 at Mon Mar 26 17:48:26 EDT 2012 kill -USR1 16861 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16861 killed at Mon Mar 26 17:48:26 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:26 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16929 >/dev/null 2>/dev/null selfserv_9280 with PID 16929 found at Mon Mar 26 17:48:26 EDT 2012 selfserv_9280 with PID 16929 started at Mon Mar 26 17:48:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4737: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 16929 at Mon Mar 26 17:48:26 EDT 2012 kill -USR1 16929 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16929 killed at Mon Mar 26 17:48:26 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:26 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 16985 >/dev/null 2>/dev/null selfserv_9280 with PID 16985 found at Mon Mar 26 17:48:26 EDT 2012 selfserv_9280 with PID 16985 started at Mon Mar 26 17:48:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4738: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 16985 at Mon Mar 26 17:48:26 EDT 2012 kill -USR1 16985 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 16985 killed at Mon Mar 26 17:48:26 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:26 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:26 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17041 >/dev/null 2>/dev/null selfserv_9280 with PID 17041 found at Mon Mar 26 17:48:27 EDT 2012 selfserv_9280 with PID 17041 started at Mon Mar 26 17:48:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4739: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 17041 at Mon Mar 26 17:48:27 EDT 2012 kill -USR1 17041 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17041 killed at Mon Mar 26 17:48:27 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17109 >/dev/null 2>/dev/null selfserv_9280 with PID 17109 found at Mon Mar 26 17:48:27 EDT 2012 selfserv_9280 with PID 17109 started at Mon Mar 26 17:48:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4740: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 17109 at Mon Mar 26 17:48:27 EDT 2012 kill -USR1 17109 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17109 killed at Mon Mar 26 17:48:27 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17165 >/dev/null 2>/dev/null selfserv_9280 with PID 17165 found at Mon Mar 26 17:48:27 EDT 2012 selfserv_9280 with PID 17165 started at Mon Mar 26 17:48:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4741: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 17165 at Mon Mar 26 17:48:27 EDT 2012 kill -USR1 17165 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17165 killed at Mon Mar 26 17:48:27 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17221 >/dev/null 2>/dev/null selfserv_9280 with PID 17221 found at Mon Mar 26 17:48:27 EDT 2012 selfserv_9280 with PID 17221 started at Mon Mar 26 17:48:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4742: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 17221 at Mon Mar 26 17:48:28 EDT 2012 kill -USR1 17221 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17221 killed at Mon Mar 26 17:48:28 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:28 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17289 >/dev/null 2>/dev/null selfserv_9280 with PID 17289 found at Mon Mar 26 17:48:28 EDT 2012 selfserv_9280 with PID 17289 started at Mon Mar 26 17:48:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4743: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 17289 at Mon Mar 26 17:48:28 EDT 2012 kill -USR1 17289 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17289 killed at Mon Mar 26 17:48:28 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:28 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17345 >/dev/null 2>/dev/null selfserv_9280 with PID 17345 found at Mon Mar 26 17:48:28 EDT 2012 selfserv_9280 with PID 17345 started at Mon Mar 26 17:48:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4744: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 17345 at Mon Mar 26 17:48:28 EDT 2012 kill -USR1 17345 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17345 killed at Mon Mar 26 17:48:28 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:28 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17401 >/dev/null 2>/dev/null selfserv_9280 with PID 17401 found at Mon Mar 26 17:48:29 EDT 2012 selfserv_9280 with PID 17401 started at Mon Mar 26 17:48:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4745: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 17401 at Mon Mar 26 17:48:29 EDT 2012 kill -USR1 17401 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17401 killed at Mon Mar 26 17:48:29 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:29 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17469 >/dev/null 2>/dev/null selfserv_9280 with PID 17469 found at Mon Mar 26 17:48:29 EDT 2012 selfserv_9280 with PID 17469 started at Mon Mar 26 17:48:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4746: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 17469 at Mon Mar 26 17:48:29 EDT 2012 kill -USR1 17469 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17469 killed at Mon Mar 26 17:48:29 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:29 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17525 >/dev/null 2>/dev/null selfserv_9280 with PID 17525 found at Mon Mar 26 17:48:29 EDT 2012 selfserv_9280 with PID 17525 started at Mon Mar 26 17:48:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4747: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 17525 at Mon Mar 26 17:48:29 EDT 2012 kill -USR1 17525 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17525 killed at Mon Mar 26 17:48:29 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:29 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17581 >/dev/null 2>/dev/null selfserv_9280 with PID 17581 found at Mon Mar 26 17:48:30 EDT 2012 selfserv_9280 with PID 17581 started at Mon Mar 26 17:48:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4748: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 17581 at Mon Mar 26 17:48:30 EDT 2012 kill -USR1 17581 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17581 killed at Mon Mar 26 17:48:30 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17649 >/dev/null 2>/dev/null selfserv_9280 with PID 17649 found at Mon Mar 26 17:48:30 EDT 2012 selfserv_9280 with PID 17649 started at Mon Mar 26 17:48:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4749: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 17649 at Mon Mar 26 17:48:30 EDT 2012 kill -USR1 17649 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17649 killed at Mon Mar 26 17:48:30 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17705 >/dev/null 2>/dev/null selfserv_9280 with PID 17705 found at Mon Mar 26 17:48:30 EDT 2012 selfserv_9280 with PID 17705 started at Mon Mar 26 17:48:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4750: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 17705 at Mon Mar 26 17:48:30 EDT 2012 kill -USR1 17705 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17705 killed at Mon Mar 26 17:48:30 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9280 starting at Mon Mar 26 17:48:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17761 >/dev/null 2>/dev/null selfserv_9280 with PID 17761 found at Mon Mar 26 17:48:30 EDT 2012 selfserv_9280 with PID 17761 started at Mon Mar 26 17:48:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4751: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 17761 at Mon Mar 26 17:48:31 EDT 2012 kill -USR1 17761 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17761 killed at Mon Mar 26 17:48:31 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:31 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17829 >/dev/null 2>/dev/null selfserv_9280 with PID 17829 found at Mon Mar 26 17:48:31 EDT 2012 selfserv_9280 with PID 17829 started at Mon Mar 26 17:48:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4752: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 17829 at Mon Mar 26 17:48:31 EDT 2012 kill -USR1 17829 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17829 killed at Mon Mar 26 17:48:31 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:31 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17885 >/dev/null 2>/dev/null selfserv_9280 with PID 17885 found at Mon Mar 26 17:48:31 EDT 2012 selfserv_9280 with PID 17885 started at Mon Mar 26 17:48:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4753: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9280 with PID 17885 at Mon Mar 26 17:48:31 EDT 2012 kill -USR1 17885 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17885 killed at Mon Mar 26 17:48:31 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:31 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:31 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 17941 >/dev/null 2>/dev/null selfserv_9280 with PID 17941 found at Mon Mar 26 17:48:32 EDT 2012 selfserv_9280 with PID 17941 started at Mon Mar 26 17:48:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4754: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 17941 at Mon Mar 26 17:48:32 EDT 2012 kill -USR1 17941 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 17941 killed at Mon Mar 26 17:48:32 EDT 2012 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/authin.tl.tmp 0 selfserv_9280 starting at Mon Mar 26 17:48:32 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:32 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:32 EDT 2012 selfserv_9280 with PID 18013 started at Mon Mar 26 17:48:32 EDT 2012 Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:32 EDT 2012 ssl.sh: #4755: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:32 EDT 2012 ssl.sh: #4756: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:32 EDT 2012 ssl.sh: #4757: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:32 EDT 2012 ssl.sh: #4758: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:33 EDT 2012 ssl.sh: #4759: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:33 EDT 2012 ssl.sh: #4760: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:33 EDT 2012 ssl.sh: #4761: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:33 EDT 2012 ssl.sh: #4762: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:33 EDT 2012 ssl.sh: #4763: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:33 EDT 2012 ssl.sh: #4764: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:33 EDT 2012 ssl.sh: #4765: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:33 EDT 2012 ssl.sh: #4766: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:34 EDT 2012 ssl.sh: #4767: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:34 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4768: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:34 EDT 2012 ssl.sh: #4769: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:34 EDT 2012 ssl.sh: #4770: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:34 EDT 2012 ssl.sh: #4771: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:34 EDT 2012 ssl.sh: #4772: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:34 EDT 2012 ssl.sh: #4773: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:34 EDT 2012 ssl.sh: #4774: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:35 EDT 2012 ssl.sh: #4775: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:35 EDT 2012 ssl.sh: #4776: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:35 EDT 2012 ssl.sh: #4777: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:35 EDT 2012 ssl.sh: #4778: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:35 EDT 2012 ssl.sh: #4779: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:35 EDT 2012 ssl.sh: #4780: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:35 EDT 2012 ssl.sh: #4781: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:35 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4782: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:35 EDT 2012 ssl.sh: #4783: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:36 EDT 2012 ssl.sh: #4784: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:36 EDT 2012 ssl.sh: #4785: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:36 EDT 2012 ssl.sh: #4786: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:36 EDT 2012 ssl.sh: #4787: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:36 EDT 2012 ssl.sh: #4788: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:36 EDT 2012 ssl.sh: #4789: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:36 EDT 2012 ssl.sh: #4790: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:36 EDT 2012 ssl.sh: #4791: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:37 EDT 2012 ssl.sh: #4792: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:37 EDT 2012 ssl.sh: #4793: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:37 EDT 2012 ssl.sh: #4794: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18013 >/dev/null 2>/dev/null selfserv_9280 with PID 18013 found at Mon Mar 26 17:48:37 EDT 2012 ssl.sh: #4795: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 18013 at Mon Mar 26 17:48:37 EDT 2012 kill -USR1 18013 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 18013 killed at Mon Mar 26 17:48:37 EDT 2012 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:37 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:37 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:37 EDT 2012 selfserv_9280 with PID 19433 started at Mon Mar 26 17:48:37 EDT 2012 Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:37 EDT 2012 ssl.sh: #4796: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:37 EDT 2012 ssl.sh: #4797: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:38 EDT 2012 ssl.sh: #4798: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:38 EDT 2012 ssl.sh: #4799: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:38 EDT 2012 ssl.sh: #4800: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:38 EDT 2012 ssl.sh: #4801: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:38 EDT 2012 ssl.sh: #4802: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:38 EDT 2012 ssl.sh: #4803: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:38 EDT 2012 ssl.sh: #4804: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:38 EDT 2012 ssl.sh: #4805: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:39 EDT 2012 ssl.sh: #4806: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:39 EDT 2012 ssl.sh: #4807: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:39 EDT 2012 ssl.sh: #4808: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:39 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4809: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:39 EDT 2012 ssl.sh: #4810: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:39 EDT 2012 ssl.sh: #4811: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:39 EDT 2012 ssl.sh: #4812: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:39 EDT 2012 ssl.sh: #4813: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:39 EDT 2012 ssl.sh: #4814: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:40 EDT 2012 ssl.sh: #4815: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:40 EDT 2012 ssl.sh: #4816: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:40 EDT 2012 ssl.sh: #4817: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:40 EDT 2012 ssl.sh: #4818: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:40 EDT 2012 ssl.sh: #4819: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:40 EDT 2012 ssl.sh: #4820: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:40 EDT 2012 ssl.sh: #4821: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:40 EDT 2012 ssl.sh: #4822: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:41 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4823: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:41 EDT 2012 ssl.sh: #4824: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:41 EDT 2012 ssl.sh: #4825: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:41 EDT 2012 ssl.sh: #4826: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:41 EDT 2012 ssl.sh: #4827: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:41 EDT 2012 ssl.sh: #4828: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:41 EDT 2012 ssl.sh: #4829: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:41 EDT 2012 ssl.sh: #4830: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:42 EDT 2012 ssl.sh: #4831: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:42 EDT 2012 ssl.sh: #4832: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:42 EDT 2012 ssl.sh: #4833: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:42 EDT 2012 ssl.sh: #4834: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:42 EDT 2012 ssl.sh: #4835: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19433 >/dev/null 2>/dev/null selfserv_9280 with PID 19433 found at Mon Mar 26 17:48:42 EDT 2012 ssl.sh: #4836: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9280 with PID 19433 at Mon Mar 26 17:48:42 EDT 2012 kill -USR1 19433 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 19433 killed at Mon Mar 26 17:48:42 EDT 2012 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:42 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20853 >/dev/null 2>/dev/null selfserv_9280 with PID 20853 found at Mon Mar 26 17:48:42 EDT 2012 selfserv_9280 with PID 20853 started at Mon Mar 26 17:48:42 EDT 2012 ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) trying to kill selfserv_9280 with PID 20853 at Mon Mar 26 17:48:42 EDT 2012 kill -USR1 20853 ./ssl.sh: line 207: 20853 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9280 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20853 killed at Mon Mar 26 17:48:42 EDT 2012 selfserv_9280 starting at Mon Mar 26 17:48:42 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:42 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:42 EDT 2012 selfserv_9280 with PID 20895 started at Mon Mar 26 17:48:42 EDT 2012 Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:43 EDT 2012 ssl.sh: #4837: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:43 EDT 2012 ssl.sh: #4838: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:43 EDT 2012 ssl.sh: #4839: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:43 EDT 2012 ssl.sh: #4840: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:43 EDT 2012 ssl.sh: #4841: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:43 EDT 2012 ssl.sh: #4842: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:43 EDT 2012 ssl.sh: #4843: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:44 EDT 2012 ssl.sh: #4844: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:44 EDT 2012 ssl.sh: #4845: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:44 EDT 2012 ssl.sh: #4846: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:44 EDT 2012 ssl.sh: #4847: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:44 EDT 2012 ssl.sh: #4848: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:44 EDT 2012 ssl.sh: #4849: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:44 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4850: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:44 EDT 2012 ssl.sh: #4851: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:45 EDT 2012 ssl.sh: #4852: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:45 EDT 2012 ssl.sh: #4853: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:45 EDT 2012 ssl.sh: #4854: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:45 EDT 2012 ssl.sh: #4855: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:45 EDT 2012 ssl.sh: #4856: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:45 EDT 2012 ssl.sh: #4857: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:45 EDT 2012 ssl.sh: #4858: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:45 EDT 2012 ssl.sh: #4859: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:46 EDT 2012 ssl.sh: #4860: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:46 EDT 2012 ssl.sh: #4861: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:46 EDT 2012 ssl.sh: #4862: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:46 EDT 2012 ssl.sh: #4863: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:46 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4864: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:46 EDT 2012 ssl.sh: #4865: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:46 EDT 2012 ssl.sh: #4866: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:47 EDT 2012 ssl.sh: #4867: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:47 EDT 2012 ssl.sh: #4868: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:47 EDT 2012 ssl.sh: #4869: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:47 EDT 2012 ssl.sh: #4870: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:47 EDT 2012 ssl.sh: #4871: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:47 EDT 2012 ssl.sh: #4872: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:47 EDT 2012 ssl.sh: #4873: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:47 EDT 2012 ssl.sh: #4874: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:48 EDT 2012 ssl.sh: #4875: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:48 EDT 2012 ssl.sh: #4876: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20895 >/dev/null 2>/dev/null selfserv_9280 with PID 20895 found at Mon Mar 26 17:48:48 EDT 2012 ssl.sh: #4877: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 20895 at Mon Mar 26 17:48:48 EDT 2012 kill -USR1 20895 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 20895 killed at Mon Mar 26 17:48:48 EDT 2012 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:48 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:48 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:48 EDT 2012 selfserv_9280 with PID 22321 started at Mon Mar 26 17:48:48 EDT 2012 Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:48 EDT 2012 ssl.sh: #4878: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:48 EDT 2012 ssl.sh: #4879: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:48 EDT 2012 ssl.sh: #4880: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:49 EDT 2012 ssl.sh: #4881: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:49 EDT 2012 ssl.sh: #4882: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:49 EDT 2012 ssl.sh: #4883: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:49 EDT 2012 ssl.sh: #4884: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:49 EDT 2012 ssl.sh: #4885: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:49 EDT 2012 ssl.sh: #4886: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:49 EDT 2012 ssl.sh: #4887: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:50 EDT 2012 ssl.sh: #4888: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:50 EDT 2012 ssl.sh: #4889: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:50 EDT 2012 ssl.sh: #4890: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:50 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4891: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:50 EDT 2012 ssl.sh: #4892: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:50 EDT 2012 ssl.sh: #4893: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:50 EDT 2012 ssl.sh: #4894: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:50 EDT 2012 ssl.sh: #4895: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:51 EDT 2012 ssl.sh: #4896: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:51 EDT 2012 ssl.sh: #4897: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:51 EDT 2012 ssl.sh: #4898: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:51 EDT 2012 ssl.sh: #4899: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:51 EDT 2012 ssl.sh: #4900: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:51 EDT 2012 ssl.sh: #4901: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:51 EDT 2012 ssl.sh: #4902: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:51 EDT 2012 ssl.sh: #4903: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:52 EDT 2012 ssl.sh: #4904: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:52 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4905: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:52 EDT 2012 ssl.sh: #4906: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:52 EDT 2012 ssl.sh: #4907: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:52 EDT 2012 ssl.sh: #4908: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:52 EDT 2012 ssl.sh: #4909: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:52 EDT 2012 ssl.sh: #4910: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:52 EDT 2012 ssl.sh: #4911: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:53 EDT 2012 ssl.sh: #4912: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:53 EDT 2012 ssl.sh: #4913: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:53 EDT 2012 ssl.sh: #4914: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:53 EDT 2012 ssl.sh: #4915: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:53 EDT 2012 ssl.sh: #4916: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:53 EDT 2012 ssl.sh: #4917: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22321 >/dev/null 2>/dev/null selfserv_9280 with PID 22321 found at Mon Mar 26 17:48:53 EDT 2012 ssl.sh: #4918: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 22321 at Mon Mar 26 17:48:53 EDT 2012 kill -USR1 22321 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 22321 killed at Mon Mar 26 17:48:53 EDT 2012 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:53 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:53 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23742 >/dev/null 2>/dev/null selfserv_9280 with PID 23742 found at Mon Mar 26 17:48:53 EDT 2012 selfserv_9280 with PID 23742 started at Mon Mar 26 17:48:53 EDT 2012 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9280 with PID 23742 at Mon Mar 26 17:48:53 EDT 2012 kill -USR1 23742 ./ssl.sh: line 207: 23742 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9280 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23742 killed at Mon Mar 26 17:48:53 EDT 2012 selfserv_9280 starting at Mon Mar 26 17:48:54 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:54 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:54 EDT 2012 selfserv_9280 with PID 23784 started at Mon Mar 26 17:48:54 EDT 2012 Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:54 EDT 2012 ssl.sh: #4919: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:54 EDT 2012 ssl.sh: #4920: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:54 EDT 2012 ssl.sh: #4921: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:54 EDT 2012 ssl.sh: #4922: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:54 EDT 2012 ssl.sh: #4923: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:54 EDT 2012 ssl.sh: #4924: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:55 EDT 2012 ssl.sh: #4925: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:55 EDT 2012 ssl.sh: #4926: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:55 EDT 2012 ssl.sh: #4927: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:55 EDT 2012 ssl.sh: #4928: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:55 EDT 2012 ssl.sh: #4929: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:55 EDT 2012 ssl.sh: #4930: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:55 EDT 2012 ssl.sh: #4931: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:56 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4932: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:56 EDT 2012 ssl.sh: #4933: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:56 EDT 2012 ssl.sh: #4934: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:56 EDT 2012 ssl.sh: #4935: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:56 EDT 2012 ssl.sh: #4936: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:56 EDT 2012 ssl.sh: #4937: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:56 EDT 2012 ssl.sh: #4938: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:56 EDT 2012 ssl.sh: #4939: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:57 EDT 2012 ssl.sh: #4940: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:57 EDT 2012 ssl.sh: #4941: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:57 EDT 2012 ssl.sh: #4942: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:57 EDT 2012 ssl.sh: #4943: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:57 EDT 2012 ssl.sh: #4944: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:57 EDT 2012 ssl.sh: #4945: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:57 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4946: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:57 EDT 2012 ssl.sh: #4947: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:58 EDT 2012 ssl.sh: #4948: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:58 EDT 2012 ssl.sh: #4949: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:58 EDT 2012 ssl.sh: #4950: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:58 EDT 2012 ssl.sh: #4951: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:58 EDT 2012 ssl.sh: #4952: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:58 EDT 2012 ssl.sh: #4953: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:58 EDT 2012 ssl.sh: #4954: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:59 EDT 2012 ssl.sh: #4955: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:59 EDT 2012 ssl.sh: #4956: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:59 EDT 2012 ssl.sh: #4957: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:59 EDT 2012 ssl.sh: #4958: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23784 >/dev/null 2>/dev/null selfserv_9280 with PID 23784 found at Mon Mar 26 17:48:59 EDT 2012 ssl.sh: #4959: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 23784 at Mon Mar 26 17:48:59 EDT 2012 kill -USR1 23784 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 23784 killed at Mon Mar 26 17:48:59 EDT 2012 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:48:59 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:48:59 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:48:59 EDT 2012 selfserv_9280 with PID 25204 started at Mon Mar 26 17:48:59 EDT 2012 Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:48:59 EDT 2012 ssl.sh: #4960: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:00 EDT 2012 ssl.sh: #4961: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:00 EDT 2012 ssl.sh: #4962: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:00 EDT 2012 ssl.sh: #4963: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:00 EDT 2012 ssl.sh: #4964: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:00 EDT 2012 ssl.sh: #4965: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:00 EDT 2012 ssl.sh: #4966: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:00 EDT 2012 ssl.sh: #4967: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:00 EDT 2012 ssl.sh: #4968: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:01 EDT 2012 ssl.sh: #4969: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:01 EDT 2012 ssl.sh: #4970: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:01 EDT 2012 ssl.sh: #4971: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:01 EDT 2012 ssl.sh: #4972: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:01 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4973: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:01 EDT 2012 ssl.sh: #4974: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:01 EDT 2012 ssl.sh: #4975: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:01 EDT 2012 ssl.sh: #4976: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:02 EDT 2012 ssl.sh: #4977: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:02 EDT 2012 ssl.sh: #4978: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:02 EDT 2012 ssl.sh: #4979: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:02 EDT 2012 ssl.sh: #4980: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:02 EDT 2012 ssl.sh: #4981: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:02 EDT 2012 ssl.sh: #4982: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:02 EDT 2012 ssl.sh: #4983: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:02 EDT 2012 ssl.sh: #4984: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:03 EDT 2012 ssl.sh: #4985: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:03 EDT 2012 ssl.sh: #4986: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:03 EDT 2012 ================= CRL Reloaded ============= ssl.sh: #4987: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:03 EDT 2012 ssl.sh: #4988: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:03 EDT 2012 ssl.sh: #4989: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:03 EDT 2012 ssl.sh: #4990: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:03 EDT 2012 ssl.sh: #4991: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:03 EDT 2012 ssl.sh: #4992: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:04 EDT 2012 ssl.sh: #4993: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:04 EDT 2012 ssl.sh: #4994: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:04 EDT 2012 ssl.sh: #4995: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:04 EDT 2012 ssl.sh: #4996: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:04 EDT 2012 ssl.sh: #4997: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:04 EDT 2012 ssl.sh: #4998: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:04 EDT 2012 ssl.sh: #4999: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9280 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25204 >/dev/null 2>/dev/null selfserv_9280 with PID 25204 found at Mon Mar 26 17:49:05 EDT 2012 ssl.sh: #5000: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9280 with PID 25204 at Mon Mar 26 17:49:05 EDT 2012 kill -USR1 25204 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 25204 killed at Mon Mar 26 17:49:05 EDT 2012 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9280 starting at Mon Mar 26 17:49:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26624 >/dev/null 2>/dev/null selfserv_9280 with PID 26624 found at Mon Mar 26 17:49:05 EDT 2012 selfserv_9280 with PID 26624 started at Mon Mar 26 17:49:05 EDT 2012 ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9280 with PID 26624 at Mon Mar 26 17:49:05 EDT 2012 kill -USR1 26624 ./ssl.sh: line 207: 26624 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9280 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26624 killed at Mon Mar 26 17:49:05 EDT 2012 ssl.sh: SSL Stress Test - server bypass/client bypass =============================== ssl.sh: Stress SSL2 RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:49:05 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:05 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 26972 >/dev/null 2>/dev/null selfserv_9280 with PID 26972 found at Mon Mar 26 17:49:05 EDT 2012 selfserv_9280 with PID 26972 started at Mon Mar 26 17:49:05 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 1000 -C A \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:05 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: SSL2 - 1 server certificates tested. strsclnt completed at Mon Mar 26 17:49:06 EDT 2012 ssl.sh: #5001: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 26972 at Mon Mar 26 17:49:06 EDT 2012 kill -USR1 26972 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 26972 killed at Mon Mar 26 17:49:06 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:49:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27048 >/dev/null 2>/dev/null selfserv_9280 with PID 27048 found at Mon Mar 26 17:49:06 EDT 2012 selfserv_9280 with PID 27048 started at Mon Mar 26 17:49:06 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:06 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:49:06 EDT 2012 ssl.sh: #5002: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 27048 at Mon Mar 26 17:49:06 EDT 2012 kill -USR1 27048 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27048 killed at Mon Mar 26 17:49:06 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:49:06 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:06 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27124 >/dev/null 2>/dev/null selfserv_9280 with PID 27124 found at Mon Mar 26 17:49:06 EDT 2012 selfserv_9280 with PID 27124 started at Mon Mar 26 17:49:06 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:06 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:49:07 EDT 2012 ssl.sh: #5003: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 27124 at Mon Mar 26 17:49:07 EDT 2012 kill -USR1 27124 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27124 killed at Mon Mar 26 17:49:07 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9280 starting at Mon Mar 26 17:49:07 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:07 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27200 >/dev/null 2>/dev/null selfserv_9280 with PID 27200 found at Mon Mar 26 17:49:07 EDT 2012 selfserv_9280 with PID 27200 started at Mon Mar 26 17:49:07 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:07 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:49:08 EDT 2012 ssl.sh: #5004: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 27200 at Mon Mar 26 17:49:08 EDT 2012 kill -USR1 27200 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27200 killed at Mon Mar 26 17:49:08 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9280 starting at Mon Mar 26 17:49:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27276 >/dev/null 2>/dev/null selfserv_9280 with PID 27276 found at Mon Mar 26 17:49:08 EDT 2012 selfserv_9280 with PID 27276 started at Mon Mar 26 17:49:08 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:08 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:49:08 EDT 2012 ssl.sh: #5005: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 27276 at Mon Mar 26 17:49:08 EDT 2012 kill -USR1 27276 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27276 killed at Mon Mar 26 17:49:08 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9280 starting at Mon Mar 26 17:49:08 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:08 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27352 >/dev/null 2>/dev/null selfserv_9280 with PID 27352 found at Mon Mar 26 17:49:08 EDT 2012 selfserv_9280 with PID 27352 started at Mon Mar 26 17:49:08 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:08 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:49:09 EDT 2012 ssl.sh: #5006: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 27352 at Mon Mar 26 17:49:09 EDT 2012 kill -USR1 27352 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27352 killed at Mon Mar 26 17:49:09 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9280 starting at Mon Mar 26 17:49:09 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:09 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27428 >/dev/null 2>/dev/null selfserv_9280 with PID 27428 found at Mon Mar 26 17:49:09 EDT 2012 selfserv_9280 with PID 27428 started at Mon Mar 26 17:49:09 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:09 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:49:10 EDT 2012 ssl.sh: #5007: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 27428 at Mon Mar 26 17:49:10 EDT 2012 kill -USR1 27428 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27428 killed at Mon Mar 26 17:49:10 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9280 starting at Mon Mar 26 17:49:10 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:10 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27504 >/dev/null 2>/dev/null selfserv_9280 with PID 27504 found at Mon Mar 26 17:49:10 EDT 2012 selfserv_9280 with PID 27504 started at Mon Mar 26 17:49:10 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:10 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:49:11 EDT 2012 ssl.sh: #5008: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 27504 at Mon Mar 26 17:49:11 EDT 2012 kill -USR1 27504 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27504 killed at Mon Mar 26 17:49:11 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9280 starting at Mon Mar 26 17:49:11 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:11 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27586 >/dev/null 2>/dev/null selfserv_9280 with PID 27586 found at Mon Mar 26 17:49:11 EDT 2012 selfserv_9280 with PID 27586 started at Mon Mar 26 17:49:11 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:11 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:49:12 EDT 2012 ssl.sh: #5009: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 27586 at Mon Mar 26 17:49:12 EDT 2012 kill -USR1 27586 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27586 killed at Mon Mar 26 17:49:12 EDT 2012 ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:49:12 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:12 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27683 >/dev/null 2>/dev/null selfserv_9280 with PID 27683 found at Mon Mar 26 17:49:12 EDT 2012 selfserv_9280 with PID 27683 started at Mon Mar 26 17:49:12 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:12 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: SSL2 - 100 server certificates tested. strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:49:13 EDT 2012 ssl.sh: #5010: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 27683 at Mon Mar 26 17:49:13 EDT 2012 kill -USR1 27683 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27683 killed at Mon Mar 26 17:49:13 EDT 2012 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:49:13 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:13 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27758 >/dev/null 2>/dev/null selfserv_9280 with PID 27758 found at Mon Mar 26 17:49:13 EDT 2012 selfserv_9280 with PID 27758 started at Mon Mar 26 17:49:13 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:13 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:49:14 EDT 2012 ssl.sh: #5011: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 27758 at Mon Mar 26 17:49:14 EDT 2012 kill -USR1 27758 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27758 killed at Mon Mar 26 17:49:14 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:49:14 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:14 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27833 >/dev/null 2>/dev/null selfserv_9280 with PID 27833 found at Mon Mar 26 17:49:14 EDT 2012 selfserv_9280 with PID 27833 started at Mon Mar 26 17:49:14 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:14 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:49:15 EDT 2012 ssl.sh: #5012: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 27833 at Mon Mar 26 17:49:15 EDT 2012 kill -USR1 27833 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27833 killed at Mon Mar 26 17:49:15 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:49:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27908 >/dev/null 2>/dev/null selfserv_9280 with PID 27908 found at Mon Mar 26 17:49:15 EDT 2012 selfserv_9280 with PID 27908 started at Mon Mar 26 17:49:15 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:15 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:49:15 EDT 2012 ssl.sh: #5013: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 27908 at Mon Mar 26 17:49:15 EDT 2012 kill -USR1 27908 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27908 killed at Mon Mar 26 17:49:15 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:49:15 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:15 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 27984 >/dev/null 2>/dev/null selfserv_9280 with PID 27984 found at Mon Mar 26 17:49:15 EDT 2012 selfserv_9280 with PID 27984 started at Mon Mar 26 17:49:15 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:15 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:49:16 EDT 2012 ssl.sh: #5014: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 27984 at Mon Mar 26 17:49:16 EDT 2012 kill -USR1 27984 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 27984 killed at Mon Mar 26 17:49:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:49:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28060 >/dev/null 2>/dev/null selfserv_9280 with PID 28060 found at Mon Mar 26 17:49:16 EDT 2012 selfserv_9280 with PID 28060 started at Mon Mar 26 17:49:16 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:49:16 EDT 2012 ssl.sh: #5015: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 28060 at Mon Mar 26 17:49:16 EDT 2012 kill -USR1 28060 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28060 killed at Mon Mar 26 17:49:16 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:49:16 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:16 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28136 >/dev/null 2>/dev/null selfserv_9280 with PID 28136 found at Mon Mar 26 17:49:16 EDT 2012 selfserv_9280 with PID 28136 started at Mon Mar 26 17:49:16 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:16 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:49:17 EDT 2012 ssl.sh: #5016: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 28136 at Mon Mar 26 17:49:17 EDT 2012 kill -USR1 28136 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28136 killed at Mon Mar 26 17:49:17 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:49:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28212 >/dev/null 2>/dev/null selfserv_9280 with PID 28212 found at Mon Mar 26 17:49:17 EDT 2012 selfserv_9280 with PID 28212 started at Mon Mar 26 17:49:17 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:17 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:49:17 EDT 2012 ssl.sh: #5017: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 28212 at Mon Mar 26 17:49:17 EDT 2012 kill -USR1 28212 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28212 killed at Mon Mar 26 17:49:17 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9280 starting at Mon Mar 26 17:49:17 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:17 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28294 >/dev/null 2>/dev/null selfserv_9280 with PID 28294 found at Mon Mar 26 17:49:17 EDT 2012 selfserv_9280 with PID 28294 started at Mon Mar 26 17:49:17 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:17 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:49:18 EDT 2012 ssl.sh: #5018: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 28294 at Mon Mar 26 17:49:18 EDT 2012 kill -USR1 28294 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28294 killed at Mon Mar 26 17:49:18 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9280 starting at Mon Mar 26 17:49:18 EDT 2012 selfserv_9280 -D -p 9280 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:18 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28376 >/dev/null 2>/dev/null selfserv_9280 with PID 28376 found at Mon Mar 26 17:49:18 EDT 2012 selfserv_9280 with PID 28376 started at Mon Mar 26 17:49:18 EDT 2012 strsclnt -q -p 9280 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:18 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:49:19 EDT 2012 ssl.sh: #5019: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 28376 at Mon Mar 26 17:49:19 EDT 2012 kill -USR1 28376 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28376 killed at Mon Mar 26 17:49:19 EDT 2012 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:49:19 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:19 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28833 >/dev/null 2>/dev/null selfserv_9280 with PID 28833 found at Mon Mar 26 17:49:19 EDT 2012 selfserv_9280 with PID 28833 started at Mon Mar 26 17:49:19 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:19 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:49:20 EDT 2012 ssl.sh: #5020: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 28833 at Mon Mar 26 17:49:20 EDT 2012 kill -USR1 28833 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28833 killed at Mon Mar 26 17:49:20 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9280 starting at Mon Mar 26 17:49:20 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:20 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28909 >/dev/null 2>/dev/null selfserv_9280 with PID 28909 found at Mon Mar 26 17:49:20 EDT 2012 selfserv_9280 with PID 28909 started at Mon Mar 26 17:49:20 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:20 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:49:21 EDT 2012 ssl.sh: #5021: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 28909 at Mon Mar 26 17:49:21 EDT 2012 kill -USR1 28909 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28909 killed at Mon Mar 26 17:49:21 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9280 starting at Mon Mar 26 17:49:21 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 28985 >/dev/null 2>/dev/null selfserv_9280 with PID 28985 found at Mon Mar 26 17:49:21 EDT 2012 selfserv_9280 with PID 28985 started at Mon Mar 26 17:49:21 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:21 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:49:21 EDT 2012 ssl.sh: #5022: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 28985 at Mon Mar 26 17:49:21 EDT 2012 kill -USR1 28985 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 28985 killed at Mon Mar 26 17:49:21 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9280 starting at Mon Mar 26 17:49:21 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:21 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29061 >/dev/null 2>/dev/null selfserv_9280 with PID 29061 found at Mon Mar 26 17:49:21 EDT 2012 selfserv_9280 with PID 29061 started at Mon Mar 26 17:49:21 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:21 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:49:22 EDT 2012 ssl.sh: #5023: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29061 at Mon Mar 26 17:49:22 EDT 2012 kill -USR1 29061 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29061 killed at Mon Mar 26 17:49:22 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9280 starting at Mon Mar 26 17:49:22 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:22 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29137 >/dev/null 2>/dev/null selfserv_9280 with PID 29137 found at Mon Mar 26 17:49:22 EDT 2012 selfserv_9280 with PID 29137 started at Mon Mar 26 17:49:22 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:22 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:49:23 EDT 2012 ssl.sh: #5024: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29137 at Mon Mar 26 17:49:23 EDT 2012 kill -USR1 29137 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29137 killed at Mon Mar 26 17:49:23 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9280 starting at Mon Mar 26 17:49:23 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:23 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29213 >/dev/null 2>/dev/null selfserv_9280 with PID 29213 found at Mon Mar 26 17:49:23 EDT 2012 selfserv_9280 with PID 29213 started at Mon Mar 26 17:49:23 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:23 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:49:24 EDT 2012 ssl.sh: #5025: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29213 at Mon Mar 26 17:49:24 EDT 2012 kill -USR1 29213 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29213 killed at Mon Mar 26 17:49:24 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9280 starting at Mon Mar 26 17:49:24 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:24 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29289 >/dev/null 2>/dev/null selfserv_9280 with PID 29289 found at Mon Mar 26 17:49:24 EDT 2012 selfserv_9280 with PID 29289 started at Mon Mar 26 17:49:24 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:24 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Mar 26 17:49:25 EDT 2012 ssl.sh: #5026: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29289 at Mon Mar 26 17:49:25 EDT 2012 kill -USR1 29289 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29289 killed at Mon Mar 26 17:49:25 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:49:25 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:25 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29394 >/dev/null 2>/dev/null selfserv_9280 with PID 29394 found at Mon Mar 26 17:49:25 EDT 2012 selfserv_9280 with PID 29394 started at Mon Mar 26 17:49:25 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:25 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:49:27 EDT 2012 ssl.sh: #5027: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29394 at Mon Mar 26 17:49:27 EDT 2012 kill -USR1 29394 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29394 killed at Mon Mar 26 17:49:27 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:49:27 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:27 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29469 >/dev/null 2>/dev/null selfserv_9280 with PID 29469 found at Mon Mar 26 17:49:27 EDT 2012 selfserv_9280 with PID 29469 started at Mon Mar 26 17:49:27 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:27 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Mar 26 17:49:28 EDT 2012 ssl.sh: #5028: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29469 at Mon Mar 26 17:49:28 EDT 2012 kill -USR1 29469 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29469 killed at Mon Mar 26 17:49:28 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:49:28 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:28 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29544 >/dev/null 2>/dev/null selfserv_9280 with PID 29544 found at Mon Mar 26 17:49:28 EDT 2012 selfserv_9280 with PID 29544 started at Mon Mar 26 17:49:28 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:28 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:49:29 EDT 2012 ssl.sh: #5029: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29544 at Mon Mar 26 17:49:29 EDT 2012 kill -USR1 29544 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29544 killed at Mon Mar 26 17:49:29 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:49:29 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29620 >/dev/null 2>/dev/null selfserv_9280 with PID 29620 found at Mon Mar 26 17:49:29 EDT 2012 selfserv_9280 with PID 29620 started at Mon Mar 26 17:49:29 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:29 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:49:29 EDT 2012 ssl.sh: #5030: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29620 at Mon Mar 26 17:49:29 EDT 2012 kill -USR1 29620 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29620 killed at Mon Mar 26 17:49:29 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:49:29 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:29 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29696 >/dev/null 2>/dev/null selfserv_9280 with PID 29696 found at Mon Mar 26 17:49:29 EDT 2012 selfserv_9280 with PID 29696 started at Mon Mar 26 17:49:29 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:29 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Mar 26 17:49:30 EDT 2012 ssl.sh: #5031: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29696 at Mon Mar 26 17:49:30 EDT 2012 kill -USR1 29696 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29696 killed at Mon Mar 26 17:49:30 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9280 starting at Mon Mar 26 17:49:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29772 >/dev/null 2>/dev/null selfserv_9280 with PID 29772 found at Mon Mar 26 17:49:30 EDT 2012 selfserv_9280 with PID 29772 started at Mon Mar 26 17:49:30 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:30 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:49:30 EDT 2012 ssl.sh: #5032: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29772 at Mon Mar 26 17:49:30 EDT 2012 kill -USR1 29772 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29772 killed at Mon Mar 26 17:49:30 EDT 2012 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9280 starting at Mon Mar 26 17:49:30 EDT 2012 selfserv_9280 -D -p 9280 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.30287 & trying to connect to selfserv_9280 at Mon Mar 26 17:49:30 EDT 2012 tstclnt -p 9280 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9280 (address=127.0.0.1) kill -0 29848 >/dev/null 2>/dev/null selfserv_9280 with PID 29848 found at Mon Mar 26 17:49:30 EDT 2012 selfserv_9280 with PID 29848 started at Mon Mar 26 17:49:30 EDT 2012 strsclnt -q -p 9280 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Mar 26 17:49:30 EDT 2012 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Mar 26 17:49:31 EDT 2012 ssl.sh: #5033: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9280 with PID 29848 at Mon Mar 26 17:49:31 EDT 2012 kill -USR1 29848 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9280 -b -p 9280 2>/dev/null; selfserv_9280 with PID 29848 killed at Mon Mar 26 17:49:31 EDT 2012 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) TIMESTAMP ssl END: Mon Mar 26 17:49:31 EDT 2012 Running tests for merge TIMESTAMP merge BEGIN: Mon Mar 26 17:49:31 EDT 2012 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v1.30287 -t "Test1" sdr.sh: #5034: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v2.30287 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #5035: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v3.30287 -t "1234567" sdr.sh: #5036: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v1.30287 -t "Test1" sdr.sh: #5037: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v2.30287 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #5038: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v3.30287 -t "1234567" sdr.sh: #5039: Decrypt - Value 3 - PASSED merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v3.30287 -t Test2 -f ../tests.pw merge.sh: #5040: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5041: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5042: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5043: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5044: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5045: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:47:09 2012 Not After : Sun Mar 26 21:47:09 2017 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:51:54:fb:c5:ba:35:0b:2d:a4:e4:e9:16:d0:e9:3d: 39:84:79:2a:71:41:29:0e:ea:19:71:ff:19:88:cd:fb: 74:5a:64:30:11:dd:52:77:2f:f5:bc:5f:fc:8a:e8:78: 4e:29:7d:28:7f:f7:af:7a:09:d8:f8:5b:ce:41:36:76: 8b:14:e6:4e:11:8c:9e:79:c3:bc:a6:60:50:0a:d7:bd: 7d:db:5d:63:24:96:af:42:95:3e:a8:a5:ca:21:cf:e2: 90:27:90:70:85:5e:ba:18:77:bb:2e:f6:7d:7a:47:38: bc:19:18:91:91:d0:b8:2c:d5:03:ab:43:12:b5:e5:2b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6e:5e:f7:70:80:17:f3:2e:7e:7e:d7:28:8b:ed:18:4a: e9:c2:4a:52:10:6b:dd:4f:72:27:bf:05:ba:fc:f7:f5: ca:89:bf:3c:87:10:de:e7:a1:6d:e5:3e:71:dc:94:65: fb:fd:a4:fc:7d:0b:81:4f:18:33:c2:85:de:20:a0:3f: 8d:5a:ec:ad:11:df:3f:f6:38:ee:e5:e2:4f:de:4f:71: 18:1f:3e:02:34:d5:43:97:cb:b9:40:59:48:ea:70:f6: fe:30:81:ca:39:c1:ad:6e:9a:52:3f:e8:1b:05:43:64: 01:31:74:07:56:47:ff:63:5a:c1:16:cd:8f:63:62:09 Fingerprint (MD5): 28:27:7E:5B:A0:DD:77:AA:C9:11:FF:61:CD:E5:EB:DA Fingerprint (SHA1): F4:C2:4F:48:5F:EE:77:EB:FC:10:83:07:57:25:A4:88:94:73:FC:E5 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #5046: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Mar 26 21:47:10 2012 Not After : Sun Mar 26 21:47:10 2017 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:bd:02:6f:8f:9d:12:e0:f1:b5:b7:6e:5e:8d:e9:bb: b8:79:28:6f:94:ed:f1:07:d3:7f:9d:e2:23:57:51:22: b3:bd:17:7e:49:e0:9b:bc:7a:e0:15:2a:4f:b9:95:71: 93:4b:2c:cc:66:1d:5c:2e:24:d5:a6:b6:3d:12:00:fa: f0:a5:2d:05:ff:4e:1a:3c:b4:03:cb:a3:ef:e6:2b:1e: 70:09:80:ef:cc:7f:83:7f:04:ba:20:b3:76:8b:ba:04: 98:86:37:ad:ef:8e:16:de:c1:af:ad:7f:a5:a6:35:5f: 08:ee:72:c1:77:7b:46:50:74:8e:b9:5d:93:d4:dc:e7 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2d:64:37:b3:ba:88:f3:43:fc:a3:31:94:8a:32:12:5d: 13:4e:d2:a2:8a:46:1a:29:00:79:1a:5b:80:36:cb:0b: d9:aa:79:ba:93:b4:33:55:f8:d9:24:48:9d:7f:e5:e9: 12:0d:e6:75:13:5e:38:84:98:9f:64:7b:65:7d:a0:20: a1:a7:3a:db:2c:7d:40:5b:1e:ff:46:b8:b9:28:61:f7: c9:9d:f2:ea:47:74:08:d1:81:01:53:96:09:d9:cc:2e: 23:2a:e6:fe:1e:fa:0c:44:8c:23:ab:34:ab:ac:ec:1d: 63:ad:bd:b9:ed:ca:45:26:1f:19:00:e3:c4:57:5c:ec Fingerprint (MD5): 7B:D0:33:60:00:67:22:E1:88:05:3C:FA:11:0A:CF:C5 Fingerprint (SHA1): 93:54:53:D6:38:05:D6:2F:BC:75:4D:C2:70:FE:74:D9:D1:EC:8C:22 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #5047: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5048: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA CT,C,C Alice u,u,u bob@bogus.com ,, Dave u,u,u eve@bogus.com ,, localhost.localdomain u,u,u localhost-sni.localdomain u,u,u ExtendedSSLUser u,u,u serverCA C,C,C clientCA T,C,C chain-1-clientCA ,, chain-2-clientCA ,, Alice #2 ,, Alice #1 ,, Alice #99 ,, Alice #3 ,, Alice #4 ,, Alice #100 ,, CRL names CRL Type TestCA CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v3.30287 -t Test2 -f ../tests.pw merge.sh: #5049: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests.v1.30287 -t Test1 -f ../tests.pw merge.sh: #5050: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #5051: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #5052: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #5053: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Mon Mar 26 21:47:20 2012 Entry (1): Serial Number: 40 (0x28) Revocation Date: Mon Mar 26 21:46:22 2012 Entry Extensions: Name: CRL reason code Entry (2): Serial Number: 42 (0x2a) Revocation Date: Mon Mar 26 21:47:17 2012 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #5054: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Mon Mar 26 17:49:37 EDT 2012 Running tests for chains TIMESTAMP chains BEGIN: Mon Mar 26 17:49:37 EDT 2012 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5055: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326174938 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5056: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5057: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5058: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326174939 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5059: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5060: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5061: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5062: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326174940 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5063: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #5064: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326174941 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5065: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #5066: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #5067: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5068: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5069: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 326174942 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5070: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der chains.sh: #5071: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5072: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #5073: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #5074: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174939 (0x137108db) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:49:40 2012 Not After : Sun Mar 26 21:49:40 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:67:05:0b:87:06:90:50:f2:5a:a3:26:6b:d6:1f:12: 06:31:03:92:c6:1f:fa:ff:5b:af:db:de:aa:54:a6:ac: 1b:75:df:d2:05:46:92:cc:fa:24:11:81:cb:25:a7:6d: 8c:99:c5:66:2e:59:0a:01:4a:ca:ff:77:3e:db:80:87: cf:fa:67:2d:d2:18:c2:34:c3:d9:7f:d3:cf:52:1e:72: 16:01:38:cb:53:88:fa:20:09:81:a5:ca:03:f8:9f:57: 59:17:40:80:af:3b:fa:ba:8b:1d:f5:31:1c:92:93:4f: e3:49:1b:66:f1:00:c0:44:4e:e9:44:09:86:47:f6:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 70:e2:32:1e:68:9f:85:e8:d9:8f:2f:11:65:4b:26:ad: 27:0e:50:6c:a0:c7:9d:30:ad:8e:20:72:f9:cc:0f:cc: e0:7f:b6:14:69:17:1b:48:7a:0a:51:ee:06:07:c0:f1: ef:c1:40:ac:ab:05:6f:6b:88:6d:db:d2:2d:ce:9d:43: 39:14:b1:cc:22:8f:d3:f9:49:2a:43:68:c2:e1:b4:af: ce:82:93:94:12:48:cb:fa:39:a1:9b:ce:ce:85:4e:8e: bf:02:56:5e:fd:bf:cd:77:22:bc:a6:9c:da:2a:47:f8: cf:20:c6:9c:2a:ae:d0:a3:52:f0:09:06:ff:24:fc:a4 Fingerprint (MD5): 07:AD:A1:2F:A6:80:A8:F9:28:A3:CD:6A:60:A6:E9:7A Fingerprint (SHA1): 4C:16:7A:EB:D9:35:2A:B3:0E:53:92:10:DA:52:FE:80:28:21:B9:83 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5075: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174938 (0x137108da) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:49:38 2012 Not After : Sun Mar 26 21:49:38 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:61:e8:b7:71:19:89:6c:bb:65:26:b4:64:03:14:9b: b5:76:fd:a8:b7:7f:3c:78:76:e9:a9:f3:76:95:3d:8e: 5f:b7:f2:d9:24:f7:4e:5e:cd:4a:a6:dd:0b:b2:a0:37: 4d:e1:e9:f8:ed:92:88:9e:73:61:c8:51:db:40:50:e1: 89:c4:5a:98:59:bb:a4:29:ef:d7:79:09:7a:73:63:f0: df:e1:62:99:73:c8:13:a5:74:53:67:35:09:8a:2c:49: de:3b:a1:03:3e:f3:27:a8:23:e0:36:6b:66:1e:2f:54: 3b:82:5f:16:f3:9b:ae:b4:ac:41:b6:9b:b8:78:23:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9d:36:36:94:fb:1a:a0:18:e9:ba:56:19:19:64:b1:cb: c8:24:4c:58:fc:76:91:4d:c5:e2:d5:59:ff:46:76:1c: 8f:9f:31:ad:c7:cf:78:8a:4e:78:e7:e7:46:ef:7f:0c: be:8d:dd:89:89:7f:f2:a9:3a:92:32:f5:82:fe:e3:c5: f7:20:88:5a:b8:db:b4:67:50:3e:d9:fe:54:6e:05:87: 80:ec:11:ef:6a:d6:28:cb:51:e8:83:28:bb:3d:5a:16: 88:b7:95:28:1d:b8:46:1c:12:85:d9:32:d2:90:8b:1d: df:10:de:26:7b:33:2f:48:7c:d8:e7:6b:9b:02:7b:ca Fingerprint (MD5): 2B:27:AE:00:5F:C4:14:99:DD:66:80:D3:BA:DC:7B:4C Fingerprint (SHA1): 21:FF:F2:01:F1:B9:1C:7E:A4:7E:39:B8:87:C6:05:2D:BE:DC:16:37 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5076: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5077: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #5078: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #5079: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174938 (0x137108da) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:49:38 2012 Not After : Sun Mar 26 21:49:38 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:61:e8:b7:71:19:89:6c:bb:65:26:b4:64:03:14:9b: b5:76:fd:a8:b7:7f:3c:78:76:e9:a9:f3:76:95:3d:8e: 5f:b7:f2:d9:24:f7:4e:5e:cd:4a:a6:dd:0b:b2:a0:37: 4d:e1:e9:f8:ed:92:88:9e:73:61:c8:51:db:40:50:e1: 89:c4:5a:98:59:bb:a4:29:ef:d7:79:09:7a:73:63:f0: df:e1:62:99:73:c8:13:a5:74:53:67:35:09:8a:2c:49: de:3b:a1:03:3e:f3:27:a8:23:e0:36:6b:66:1e:2f:54: 3b:82:5f:16:f3:9b:ae:b4:ac:41:b6:9b:b8:78:23:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9d:36:36:94:fb:1a:a0:18:e9:ba:56:19:19:64:b1:cb: c8:24:4c:58:fc:76:91:4d:c5:e2:d5:59:ff:46:76:1c: 8f:9f:31:ad:c7:cf:78:8a:4e:78:e7:e7:46:ef:7f:0c: be:8d:dd:89:89:7f:f2:a9:3a:92:32:f5:82:fe:e3:c5: f7:20:88:5a:b8:db:b4:67:50:3e:d9:fe:54:6e:05:87: 80:ec:11:ef:6a:d6:28:cb:51:e8:83:28:bb:3d:5a:16: 88:b7:95:28:1d:b8:46:1c:12:85:d9:32:d2:90:8b:1d: df:10:de:26:7b:33:2f:48:7c:d8:e7:6b:9b:02:7b:ca Fingerprint (MD5): 2B:27:AE:00:5F:C4:14:99:DD:66:80:D3:BA:DC:7B:4C Fingerprint (SHA1): 21:FF:F2:01:F1:B9:1C:7E:A4:7E:39:B8:87:C6:05:2D:BE:DC:16:37 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5080: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174939 (0x137108db) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:49:40 2012 Not After : Sun Mar 26 21:49:40 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:67:05:0b:87:06:90:50:f2:5a:a3:26:6b:d6:1f:12: 06:31:03:92:c6:1f:fa:ff:5b:af:db:de:aa:54:a6:ac: 1b:75:df:d2:05:46:92:cc:fa:24:11:81:cb:25:a7:6d: 8c:99:c5:66:2e:59:0a:01:4a:ca:ff:77:3e:db:80:87: cf:fa:67:2d:d2:18:c2:34:c3:d9:7f:d3:cf:52:1e:72: 16:01:38:cb:53:88:fa:20:09:81:a5:ca:03:f8:9f:57: 59:17:40:80:af:3b:fa:ba:8b:1d:f5:31:1c:92:93:4f: e3:49:1b:66:f1:00:c0:44:4e:e9:44:09:86:47:f6:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 70:e2:32:1e:68:9f:85:e8:d9:8f:2f:11:65:4b:26:ad: 27:0e:50:6c:a0:c7:9d:30:ad:8e:20:72:f9:cc:0f:cc: e0:7f:b6:14:69:17:1b:48:7a:0a:51:ee:06:07:c0:f1: ef:c1:40:ac:ab:05:6f:6b:88:6d:db:d2:2d:ce:9d:43: 39:14:b1:cc:22:8f:d3:f9:49:2a:43:68:c2:e1:b4:af: ce:82:93:94:12:48:cb:fa:39:a1:9b:ce:ce:85:4e:8e: bf:02:56:5e:fd:bf:cd:77:22:bc:a6:9c:da:2a:47:f8: cf:20:c6:9c:2a:ae:d0:a3:52:f0:09:06:ff:24:fc:a4 Fingerprint (MD5): 07:AD:A1:2F:A6:80:A8:F9:28:A3:CD:6A:60:A6:E9:7A Fingerprint (SHA1): 4C:16:7A:EB:D9:35:2A:B3:0E:53:92:10:DA:52:FE:80:28:21:B9:83 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5081: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #5082: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #5083: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5084: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5085: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5086: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174939 (0x137108db) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:49:40 2012 Not After : Sun Mar 26 21:49:40 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:67:05:0b:87:06:90:50:f2:5a:a3:26:6b:d6:1f:12: 06:31:03:92:c6:1f:fa:ff:5b:af:db:de:aa:54:a6:ac: 1b:75:df:d2:05:46:92:cc:fa:24:11:81:cb:25:a7:6d: 8c:99:c5:66:2e:59:0a:01:4a:ca:ff:77:3e:db:80:87: cf:fa:67:2d:d2:18:c2:34:c3:d9:7f:d3:cf:52:1e:72: 16:01:38:cb:53:88:fa:20:09:81:a5:ca:03:f8:9f:57: 59:17:40:80:af:3b:fa:ba:8b:1d:f5:31:1c:92:93:4f: e3:49:1b:66:f1:00:c0:44:4e:e9:44:09:86:47:f6:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 70:e2:32:1e:68:9f:85:e8:d9:8f:2f:11:65:4b:26:ad: 27:0e:50:6c:a0:c7:9d:30:ad:8e:20:72:f9:cc:0f:cc: e0:7f:b6:14:69:17:1b:48:7a:0a:51:ee:06:07:c0:f1: ef:c1:40:ac:ab:05:6f:6b:88:6d:db:d2:2d:ce:9d:43: 39:14:b1:cc:22:8f:d3:f9:49:2a:43:68:c2:e1:b4:af: ce:82:93:94:12:48:cb:fa:39:a1:9b:ce:ce:85:4e:8e: bf:02:56:5e:fd:bf:cd:77:22:bc:a6:9c:da:2a:47:f8: cf:20:c6:9c:2a:ae:d0:a3:52:f0:09:06:ff:24:fc:a4 Fingerprint (MD5): 07:AD:A1:2F:A6:80:A8:F9:28:A3:CD:6A:60:A6:E9:7A Fingerprint (SHA1): 4C:16:7A:EB:D9:35:2A:B3:0E:53:92:10:DA:52:FE:80:28:21:B9:83 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5087: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174939 (0x137108db) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:49:40 2012 Not After : Sun Mar 26 21:49:40 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:67:05:0b:87:06:90:50:f2:5a:a3:26:6b:d6:1f:12: 06:31:03:92:c6:1f:fa:ff:5b:af:db:de:aa:54:a6:ac: 1b:75:df:d2:05:46:92:cc:fa:24:11:81:cb:25:a7:6d: 8c:99:c5:66:2e:59:0a:01:4a:ca:ff:77:3e:db:80:87: cf:fa:67:2d:d2:18:c2:34:c3:d9:7f:d3:cf:52:1e:72: 16:01:38:cb:53:88:fa:20:09:81:a5:ca:03:f8:9f:57: 59:17:40:80:af:3b:fa:ba:8b:1d:f5:31:1c:92:93:4f: e3:49:1b:66:f1:00:c0:44:4e:e9:44:09:86:47:f6:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 70:e2:32:1e:68:9f:85:e8:d9:8f:2f:11:65:4b:26:ad: 27:0e:50:6c:a0:c7:9d:30:ad:8e:20:72:f9:cc:0f:cc: e0:7f:b6:14:69:17:1b:48:7a:0a:51:ee:06:07:c0:f1: ef:c1:40:ac:ab:05:6f:6b:88:6d:db:d2:2d:ce:9d:43: 39:14:b1:cc:22:8f:d3:f9:49:2a:43:68:c2:e1:b4:af: ce:82:93:94:12:48:cb:fa:39:a1:9b:ce:ce:85:4e:8e: bf:02:56:5e:fd:bf:cd:77:22:bc:a6:9c:da:2a:47:f8: cf:20:c6:9c:2a:ae:d0:a3:52:f0:09:06:ff:24:fc:a4 Fingerprint (MD5): 07:AD:A1:2F:A6:80:A8:F9:28:A3:CD:6A:60:A6:E9:7A Fingerprint (SHA1): 4C:16:7A:EB:D9:35:2A:B3:0E:53:92:10:DA:52:FE:80:28:21:B9:83 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5088: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #5089: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #5090: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5091: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #5092: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #5093: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174938 (0x137108da) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:49:38 2012 Not After : Sun Mar 26 21:49:38 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:61:e8:b7:71:19:89:6c:bb:65:26:b4:64:03:14:9b: b5:76:fd:a8:b7:7f:3c:78:76:e9:a9:f3:76:95:3d:8e: 5f:b7:f2:d9:24:f7:4e:5e:cd:4a:a6:dd:0b:b2:a0:37: 4d:e1:e9:f8:ed:92:88:9e:73:61:c8:51:db:40:50:e1: 89:c4:5a:98:59:bb:a4:29:ef:d7:79:09:7a:73:63:f0: df:e1:62:99:73:c8:13:a5:74:53:67:35:09:8a:2c:49: de:3b:a1:03:3e:f3:27:a8:23:e0:36:6b:66:1e:2f:54: 3b:82:5f:16:f3:9b:ae:b4:ac:41:b6:9b:b8:78:23:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9d:36:36:94:fb:1a:a0:18:e9:ba:56:19:19:64:b1:cb: c8:24:4c:58:fc:76:91:4d:c5:e2:d5:59:ff:46:76:1c: 8f:9f:31:ad:c7:cf:78:8a:4e:78:e7:e7:46:ef:7f:0c: be:8d:dd:89:89:7f:f2:a9:3a:92:32:f5:82:fe:e3:c5: f7:20:88:5a:b8:db:b4:67:50:3e:d9:fe:54:6e:05:87: 80:ec:11:ef:6a:d6:28:cb:51:e8:83:28:bb:3d:5a:16: 88:b7:95:28:1d:b8:46:1c:12:85:d9:32:d2:90:8b:1d: df:10:de:26:7b:33:2f:48:7c:d8:e7:6b:9b:02:7b:ca Fingerprint (MD5): 2B:27:AE:00:5F:C4:14:99:DD:66:80:D3:BA:DC:7B:4C Fingerprint (SHA1): 21:FF:F2:01:F1:B9:1C:7E:A4:7E:39:B8:87:C6:05:2D:BE:DC:16:37 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5094: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174938 (0x137108da) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:49:38 2012 Not After : Sun Mar 26 21:49:38 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:61:e8:b7:71:19:89:6c:bb:65:26:b4:64:03:14:9b: b5:76:fd:a8:b7:7f:3c:78:76:e9:a9:f3:76:95:3d:8e: 5f:b7:f2:d9:24:f7:4e:5e:cd:4a:a6:dd:0b:b2:a0:37: 4d:e1:e9:f8:ed:92:88:9e:73:61:c8:51:db:40:50:e1: 89:c4:5a:98:59:bb:a4:29:ef:d7:79:09:7a:73:63:f0: df:e1:62:99:73:c8:13:a5:74:53:67:35:09:8a:2c:49: de:3b:a1:03:3e:f3:27:a8:23:e0:36:6b:66:1e:2f:54: 3b:82:5f:16:f3:9b:ae:b4:ac:41:b6:9b:b8:78:23:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9d:36:36:94:fb:1a:a0:18:e9:ba:56:19:19:64:b1:cb: c8:24:4c:58:fc:76:91:4d:c5:e2:d5:59:ff:46:76:1c: 8f:9f:31:ad:c7:cf:78:8a:4e:78:e7:e7:46:ef:7f:0c: be:8d:dd:89:89:7f:f2:a9:3a:92:32:f5:82:fe:e3:c5: f7:20:88:5a:b8:db:b4:67:50:3e:d9:fe:54:6e:05:87: 80:ec:11:ef:6a:d6:28:cb:51:e8:83:28:bb:3d:5a:16: 88:b7:95:28:1d:b8:46:1c:12:85:d9:32:d2:90:8b:1d: df:10:de:26:7b:33:2f:48:7c:d8:e7:6b:9b:02:7b:ca Fingerprint (MD5): 2B:27:AE:00:5F:C4:14:99:DD:66:80:D3:BA:DC:7B:4C Fingerprint (SHA1): 21:FF:F2:01:F1:B9:1C:7E:A4:7E:39:B8:87:C6:05:2D:BE:DC:16:37 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5095: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #5096: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326174943 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5097: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #5098: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #5099: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326174944 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5100: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #5101: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #5102: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326174945 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5103: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #5104: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #5105: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326174946 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5106: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #5107: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #5108: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326174947 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5109: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #5110: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #5111: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326174948 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5112: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #5113: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #5114: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326174949 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5115: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #5116: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #5117: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326174950 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5118: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #5119: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #5120: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326174951 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5121: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #5122: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #5123: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5124: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 326174952 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5125: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der chains.sh: #5126: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 326174953 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5127: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der chains.sh: #5128: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 326174954 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5129: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der chains.sh: #5130: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #5131: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #5132: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5133: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 326174955 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5134: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der chains.sh: #5135: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 326174956 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5136: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der chains.sh: #5137: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 326174957 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5138: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der chains.sh: #5139: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #5140: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #5141: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5142: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 326174958 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5143: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der chains.sh: #5144: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 326174959 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5145: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der chains.sh: #5146: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 326174960 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5147: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der chains.sh: #5148: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #5149: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #5150: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5151: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 326174961 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5152: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der chains.sh: #5153: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 326174962 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5154: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der chains.sh: #5155: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 326174963 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5156: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der chains.sh: #5157: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #5158: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5159: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5160: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 326174964 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5161: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der chains.sh: #5162: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5163: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5164: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326174965 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5165: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #5166: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174943 (0x137108df) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Mar 26 21:49:47 2012 Not After : Sun Mar 26 21:49:47 2062 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:b9:ab:0c:03:3d:fc:87:0e:30:61:b3:14:60:98:4c: 62:51:24:b8:49:f8:7c:af:9a:dc:8e:92:42:4a:b2:cf: 39:81:27:7a:a5:52:cf:88:03:a7:0a:77:59:7a:b6:0a: 94:d6:dd:1b:ce:0a:8c:df:30:65:33:19:6d:9e:3a:1e: f4:b1:0c:40:7a:ae:78:64:28:9d:58:b4:24:bf:9e:3f: 4b:10:17:61:21:66:ec:df:8c:ce:fe:cd:0b:98:1f:da: e3:90:b1:fb:13:f5:1a:84:b6:7b:fd:59:f2:57:67:19: 30:0a:ab:df:f5:85:af:38:32:9d:ce:7d:a0:86:16:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 30:2c:f6:6a:3c:0c:bc:dc:36:88:41:7b:c1:7b:ae:f1: 72:2b:de:1e:56:3f:e4:d1:04:10:11:f5:81:4c:69:dd: 12:db:04:2d:96:9e:75:9b:c3:95:fb:8c:dd:db:fc:e5: 0a:c6:c6:0c:eb:59:7c:6a:59:33:b3:e4:4b:b5:d9:05: 53:25:b1:5d:86:a8:74:b5:08:b8:17:97:2d:b4:b9:d8: 12:23:c5:42:c6:df:90:61:f9:bf:18:9f:23:f8:4a:cf: e0:e8:e4:28:6c:be:8b:db:38:92:82:5f:2f:b9:1a:ed: 27:a7:4f:1c:ae:c6:fd:cc:6a:9f:de:20:74:09:1f:d5 Fingerprint (MD5): B6:21:7E:54:7A:1D:1C:09:AC:3B:17:0A:2E:31:DE:DA Fingerprint (SHA1): 89:BF:C8:72:55:16:E6:1E:D7:97:B3:4A:27:80:2A:1A:61:FC:53:0C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #5167: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174944 (0x137108e0) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Mar 26 21:49:48 2012 Not After : Sun Mar 26 21:49:48 2062 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:7d:ad:f5:d8:4e:30:2e:7a:ae:84:3b:26:76:88:87: 50:68:c4:a8:69:93:a8:c0:df:94:30:93:fa:45:2e:16: 4f:de:f1:2a:91:4b:60:e2:1d:28:b3:a8:ea:00:fc:b4: 38:fc:5e:12:53:51:2b:8d:31:03:49:6d:17:c9:a9:05: 2b:76:6d:b2:89:c9:7d:42:95:5d:d4:89:66:37:1e:5d: 01:1a:63:3d:0d:e2:79:92:df:90:d0:ca:9a:ac:0b:ce: 3f:f7:c5:e2:ac:c9:05:7d:3c:f1:b1:2a:0e:d9:41:1a: 78:41:f1:19:6a:34:d8:b6:37:20:73:9c:6d:c7:6d:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:0a:1f:73:aa:9e:77:51:3d:32:58:0c:71:3d:c6:37: ed:bb:55:b7:aa:2c:45:e4:ac:ae:3a:55:d1:2f:e2:a5: a0:76:a2:3d:88:1f:99:cd:1a:c3:94:9c:4b:44:a4:5f: c1:00:c3:2e:ba:88:2e:a7:e1:41:8d:9d:7b:f0:a3:63: 44:7e:08:f2:dc:ea:04:d1:c6:9d:c1:1c:eb:2e:fe:01: 3c:4a:0e:9c:f6:86:78:9d:05:08:a4:e1:57:a9:59:83: 6d:51:36:d9:56:3b:2b:2d:e9:ac:a4:68:a4:be:16:b2: cf:7e:87:86:2f:c4:1a:d6:d9:30:de:a8:f1:14:e2:3e Fingerprint (MD5): B4:80:67:0C:DE:28:52:FF:6C:1E:FB:C7:68:20:75:74 Fingerprint (SHA1): 67:43:F4:0C:1D:C0:BC:59:A4:80:DA:90:5E:C1:AE:E4:5C:50:07:83 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #5168: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174945 (0x137108e1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Mar 26 21:49:50 2012 Not After : Sun Mar 26 21:49:50 2062 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:08:1d:f3:17:1c:a4:12:8d:c0:5c:39:a9:1e:2d:e8: f2:9d:33:42:e2:32:e7:10:ca:1e:f0:fd:e8:f0:2f:98: 55:4e:36:25:5f:c6:82:08:53:3d:2d:d7:32:8f:4e:1e: 8c:fd:94:0d:95:0c:1c:a1:c2:a7:35:3c:be:30:89:f3: 7a:b8:29:91:f4:45:6d:f4:05:a0:ee:84:30:7f:81:7b: 4b:62:c4:c1:05:90:18:c6:5d:4b:26:b3:c1:92:84:b3: b0:cd:be:c6:49:7e:4d:48:24:7b:dd:c5:62:d6:72:aa: 7f:ed:11:43:13:64:a2:84:3a:98:b4:49:5f:c2:42:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b4:7e:5b:f8:78:7b:c8:75:72:c5:32:3d:09:60:4a:5a: 13:3f:59:91:b3:33:eb:0f:ee:a0:31:19:13:d6:f8:a1: 11:26:ca:27:41:91:28:a6:cc:ea:ae:a5:d8:b6:c4:8b: 16:59:20:9f:9f:9c:01:d0:1a:a9:80:bb:48:92:fc:12: 0b:86:7d:18:0b:99:ce:f6:2b:e1:4d:f0:1b:a9:34:7e: 08:d0:20:5f:4c:08:89:17:0f:1b:fc:db:36:40:0e:04: ac:f3:f9:f5:1e:a3:27:e0:8b:a9:32:d7:66:9d:53:87: 7c:5f:b7:b1:a2:19:b2:10:99:e3:fc:79:7e:83:3f:8c Fingerprint (MD5): FF:C7:6A:36:B7:33:FE:E8:C1:5F:CC:83:E1:D3:3A:D2 Fingerprint (SHA1): 47:9A:32:01:5F:33:AB:F2:40:5E:B4:4E:79:B2:41:23:49:AF:60:B7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #5169: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174946 (0x137108e2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Mar 26 21:49:51 2012 Not After : Sun Mar 26 21:49:51 2062 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:16:9e:cb:ec:f8:50:d2:ad:d3:61:d7:38:9f:34:a3: 94:00:2d:98:52:0c:96:35:32:87:3d:28:f0:8d:b1:cf: 4f:a2:40:d0:b2:be:a6:d6:21:1a:4f:92:35:b7:84:bc: d1:82:56:fc:50:db:68:b6:a2:01:73:2a:f9:ad:22:1e: ba:fe:96:6d:a5:28:f0:0e:ff:ef:1a:c6:07:25:f0:12: 96:d8:b6:b0:4f:30:d9:63:bf:4b:a7:f1:1c:f3:db:45: 8c:63:4a:63:c7:8a:5b:cf:6a:07:35:b7:62:f2:b2:64: cc:36:1a:97:03:1b:24:51:c7:16:ef:f6:4e:fc:20:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:f5:31:88:cf:3b:6d:bf:8c:fc:64:3f:ee:d2:78:44: 00:89:b2:72:86:5a:8f:76:b0:0c:c7:c8:c4:29:d1:c2: 11:d1:6e:dc:6c:79:b8:c6:ab:50:31:70:2d:68:91:a5: 50:45:bf:43:bb:10:45:30:3d:de:72:b5:60:a9:3c:2c: f9:f5:ad:e9:3a:18:aa:97:8d:45:26:b7:07:63:73:da: 13:13:72:1d:7f:f2:f7:93:df:b1:d8:a6:13:55:62:2d: bd:df:ab:cc:5e:53:f0:b0:4a:37:cb:ac:b0:14:3c:6f: 1a:91:bd:6a:1d:96:38:8c:33:63:e1:d9:2f:91:31:b2 Fingerprint (MD5): 7F:12:B1:4E:E7:61:F6:A3:A4:C3:91:2F:BA:F5:AF:AC Fingerprint (SHA1): B0:8B:CA:5E:C1:41:F7:2B:E9:D1:7C:A4:C7:10:4D:8E:57:FD:D4:9F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #5170: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174947 (0x137108e3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Mar 26 21:49:52 2012 Not After : Sun Mar 26 21:49:52 2062 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:61:56:fd:19:1a:ec:40:2e:57:92:7d:81:d7:98:1e: 71:4e:2c:6d:12:ce:ff:c0:b4:2e:d7:5f:a0:a6:cf:42: 60:e8:3c:eb:2e:7f:8a:b9:b6:32:61:e0:47:97:2a:75: 97:0f:46:a3:c3:22:6c:32:5c:04:fa:80:22:28:9f:0c: 22:ca:53:e7:15:55:cc:cb:b9:04:07:6f:1c:2b:c0:82: 6d:ef:86:6a:3b:73:01:f2:f9:64:07:15:d8:0a:21:d0: 7d:44:be:06:c5:a9:68:34:71:3e:74:b3:e1:bb:04:58: fb:2d:df:e9:fd:e9:c2:7f:50:1a:10:53:bb:73:a6:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 5d:fd:9e:dd:c8:a9:25:2e:f8:b7:3c:c3:ad:51:86:2a: c1:9e:35:2e:9c:01:75:a3:b4:a0:1e:cd:39:cb:9f:63: 8a:39:b9:93:ed:65:1d:f0:18:4d:96:89:fd:94:a0:f1: 46:3f:2a:90:d5:c5:88:a4:61:51:0c:e4:94:f4:aa:e3: e0:77:4c:58:9c:d3:df:6b:74:7c:87:12:a6:a3:43:6b: ee:dc:06:1d:a1:85:ca:aa:98:ac:a8:fc:23:4a:69:96: c3:95:91:7e:68:7b:aa:91:c7:2b:37:2e:de:f3:d4:fd: 27:80:5a:fe:53:47:61:31:d7:95:06:0a:1b:01:23:16 Fingerprint (MD5): 91:D0:65:2E:33:97:AA:51:E2:C6:FE:47:82:E8:1E:81 Fingerprint (SHA1): A5:D2:E0:B3:48:22:65:D6:10:BD:DC:04:6D:2B:46:38:33:01:54:A1 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #5171: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174948 (0x137108e4) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Mar 26 21:49:53 2012 Not After : Sun Mar 26 21:49:53 2062 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:02:76:64:15:1f:ae:4f:ed:70:4e:c6:77:d4:ea:9c: dc:91:06:c1:08:2f:75:18:e4:63:44:df:6e:d1:28:7c: 0d:4d:24:51:b1:85:74:84:00:68:20:18:54:66:70:14: 98:04:81:2c:25:eb:b2:c5:d0:94:c1:83:2a:ff:97:59: e6:82:d0:9f:f5:5e:f1:03:8a:85:e1:31:0d:12:87:77: 27:e3:a3:ad:6b:ac:6f:6b:f3:32:44:9b:df:e1:da:86: 84:a2:2c:03:34:16:54:32:60:3c:dc:24:ad:79:e1:86: 44:c8:ee:b2:89:b6:e4:c4:3e:d6:1f:e6:db:ba:9b:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 5d:c9:c0:fd:c0:c0:47:a0:42:3b:67:94:05:23:16:ab: f7:47:31:42:7a:3f:e5:fc:35:0c:1c:3b:bb:14:4b:af: 23:5d:66:02:45:c0:27:29:74:22:b6:ef:95:a8:90:10: 2c:61:bd:83:cc:43:23:be:e8:66:a0:04:b2:e8:ce:73: 9d:e5:d2:9c:8d:a6:d5:d0:7a:1d:07:05:64:0d:5d:09: 61:0b:b7:28:00:24:26:53:21:21:1a:cb:56:b7:3a:d1: 0b:e0:e1:26:b4:65:e1:ae:b8:29:35:c7:68:55:b6:fe: 3d:b9:1d:2a:ce:1c:fd:47:44:67:c7:e6:d1:6e:ee:7f Fingerprint (MD5): 12:15:80:AF:0B:9F:DE:32:92:1A:8F:D8:EF:95:91:C8 Fingerprint (SHA1): 4A:B3:76:02:AD:FC:A1:96:14:67:5D:F9:D7:7B:B3:B5:C0:6C:A6:1E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #5172: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174949 (0x137108e5) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Mar 26 21:49:54 2012 Not After : Sun Mar 26 21:49:54 2062 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:2a:7c:d6:68:a2:cf:01:87:bc:c3:82:cf:dd:9e:d1: 79:bd:18:d9:46:2f:f2:a1:9d:96:b7:bc:52:78:e3:eb: 2b:93:f1:2f:b8:9f:fa:58:b0:80:81:36:00:c3:1d:ed: 4b:ac:e8:97:7c:e2:c4:dc:da:61:49:97:e3:f7:87:76: b1:ea:08:ed:8e:9f:dd:14:e9:48:59:27:34:ab:73:c2: 85:d1:e6:c5:a5:a7:cb:8e:bf:ab:78:4a:d9:4f:2c:b6: f4:cc:d7:89:89:b1:47:a2:15:49:68:f8:d6:9e:2d:b1: 4d:e6:ae:a2:c8:88:47:ae:2a:0b:9c:78:fe:87:05:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 07:93:16:cc:25:d0:72:e9:a1:19:a7:6f:df:ed:0f:7d: fd:84:75:36:7b:8a:98:f1:c8:ba:6b:87:7e:7e:61:bf: 59:53:05:f5:70:6b:8e:d8:9b:58:55:e9:d2:5b:bb:69: 08:da:92:04:46:da:ab:5d:d6:4e:29:48:21:d0:e3:04: e2:72:85:f0:88:d5:00:2f:c6:f5:a9:7c:35:b7:64:da: 2b:05:06:78:27:91:8c:a1:08:07:c4:07:86:46:ac:94: c3:ae:6a:49:ad:23:cf:22:5f:b1:45:25:d0:35:56:f0: 89:56:cc:fe:86:90:02:52:d4:90:0b:92:4b:a1:77:df Fingerprint (MD5): A5:97:33:84:42:43:A5:56:73:A4:34:7D:86:CB:61:B4 Fingerprint (SHA1): 85:62:98:C2:AA:4D:54:EB:7F:FD:C4:D2:B0:30:C3:5C:85:E3:F1:80 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #5173: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174950 (0x137108e6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Mar 26 21:49:55 2012 Not After : Sun Mar 26 21:49:55 2062 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:4d:5a:b2:e4:6f:ae:b1:c6:fa:f5:de:7b:22:d5:50: 1b:81:f2:9e:f7:c8:49:3e:d8:53:3a:64:2d:e2:cf:f6: a3:df:05:de:e3:37:61:bb:23:c6:4f:b2:a1:74:b1:8d: b6:db:ad:1d:7f:c4:7c:b9:e7:27:98:35:c2:a4:69:d4: cc:be:d2:e4:b1:7a:e5:c3:87:89:93:7f:4a:fd:fb:a8: 45:6a:e3:70:29:65:4c:48:e1:eb:5f:91:d6:9e:96:40: b5:0c:14:77:a0:7e:ad:f4:45:29:9a:89:2e:4b:8b:4b: 8d:32:a0:5b:8e:c7:bb:0a:5f:41:44:53:3f:9d:29:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b7:cc:7c:a6:4b:83:54:61:0d:4b:96:3d:89:1d:23:4c: ce:22:e0:86:72:c3:8d:7e:a9:74:39:08:df:a9:cb:0c: d6:fe:7c:a7:f4:fd:ee:a1:88:63:33:8e:78:9d:5c:0b: ce:43:d8:18:e2:ae:fa:12:fb:b7:62:81:ff:5c:96:f1: ee:3a:ee:27:0f:76:93:d9:f4:01:26:5e:09:da:30:90: 95:a3:50:b6:54:f4:26:f4:40:c2:04:4e:cd:58:c2:46: e5:68:bc:98:45:7b:9d:f8:8a:ff:5d:a8:af:f6:a3:d1: 73:21:7b:f5:5f:5d:0e:70:c4:52:5c:4e:6b:41:51:9c Fingerprint (MD5): D0:8F:9B:5A:A7:D5:01:86:E9:B1:80:14:D0:9B:3D:E3 Fingerprint (SHA1): 57:E5:81:7A:92:B9:E4:4A:C6:E3:6D:15:B2:00:EF:8E:20:5E:95:10 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #5174: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174951 (0x137108e7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Mar 26 21:49:56 2012 Not After : Sun Mar 26 21:49:56 2062 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:72:8f:7c:45:0a:df:3c:78:b9:e5:6a:40:8d:6e:2c: a9:26:e3:24:22:b1:c0:01:7d:17:aa:69:00:bb:f7:a1: 1a:6d:f2:d3:fa:d8:31:6c:ed:1b:33:7f:bb:9d:ae:f6: 68:22:78:3c:00:14:25:63:3a:3f:82:22:00:c9:87:97: 24:0e:46:74:80:00:1d:21:5c:bd:87:7f:fd:65:9e:6e: 1d:44:9f:29:09:0e:24:94:f5:1a:ae:c6:67:a8:ad:78: 11:e5:ec:46:67:eb:89:c7:ef:2a:bd:e4:ff:ac:71:72: fe:2e:94:28:5d:a6:61:42:04:8a:eb:1b:b8:6a:0d:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b3:1a:b3:ab:74:de:2f:c3:01:e6:9a:22:16:de:d5:94: 7c:6b:b7:59:74:d8:65:57:e8:d2:bb:76:38:80:dd:ca: 73:01:5f:2d:fe:1e:53:ce:32:df:3d:a8:f6:e7:eb:c2: e6:1f:d4:06:b9:ea:9e:d9:2c:4a:b3:5f:5f:3d:f9:72: f4:8f:5d:96:f2:8a:b4:d8:d1:67:cd:f2:3c:d6:d7:2a: e4:03:40:d5:80:9d:1b:3b:37:25:43:ea:a1:a3:79:07: 1f:cf:8a:59:9e:2f:22:07:cf:91:2e:f2:62:20:5a:b1: a0:31:74:9f:7a:cf:29:37:a7:10:10:f7:b6:17:ab:84 Fingerprint (MD5): EF:74:33:8D:B2:34:3C:1F:6D:CE:F0:A0:8F:21:5D:3F Fingerprint (SHA1): 33:4C:7D:86:9C:60:10:AA:0A:15:CE:B4:BF:CE:34:F3:E7:74:B8:EB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #5175: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5176: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326174966 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5177: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5178: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5179: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5180: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174967 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5181: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5182: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5183: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5184: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174968 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5185: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5186: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5187: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5188: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326174969 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5189: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #5190: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5191: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174966 (0x137108f6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:50:08 2012 Not After : Sun Mar 26 21:50:08 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:87:0c:c5:58:22:36:cc:b3:21:c3:76:72:49:77:07: 0e:60:0f:b4:e8:e3:74:29:57:46:b3:b4:26:62:9c:1c: b4:b8:3f:4f:fc:84:10:f6:92:bc:04:34:28:09:98:19: 7c:21:b9:a6:5b:0a:43:7f:1b:a8:e9:0d:1d:a8:f6:97: a1:2f:bb:dd:87:dc:fa:bb:86:fc:95:06:23:18:aa:4f: bd:2d:c1:a8:92:13:87:e1:be:0f:9d:cf:7a:d4:24:ba: 75:b1:3f:c7:e8:bb:cb:cc:68:2e:f2:12:5d:b3:75:3a: ad:0e:44:16:0f:75:58:44:fe:77:ca:d4:e5:64:17:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 61:5b:1f:e4:f0:b2:12:f1:7e:86:09:5f:3f:f7:7c:02: 53:26:ed:33:06:42:d6:6e:dd:27:8f:dd:73:66:89:0b: 58:80:5f:83:e7:ae:41:3a:12:5c:f6:52:28:58:3b:ef: 4e:21:84:52:f9:0c:c4:ac:98:30:c2:5f:c6:d5:89:54: d2:e1:2f:05:a2:b6:23:1b:9c:30:3f:8d:5f:47:e7:a8: c0:6f:e0:db:8b:16:79:d7:7c:2d:51:7f:64:16:e4:a5: 83:64:63:53:59:ef:72:6f:aa:81:ad:39:38:dd:e7:2d: a3:67:07:53:7c:ba:3e:83:e3:72:96:70:9d:cb:a2:0b Fingerprint (MD5): 67:A7:C0:23:3D:9D:64:6F:55:C8:F3:26:A8:22:30:45 Fingerprint (SHA1): 67:75:C5:D1:06:EA:A5:24:10:73:BB:9E:F2:2C:B4:69:7C:25:AE:D9 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5192: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5193: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174967 (0x137108f7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:50:10 2012 Not After : Sun Mar 26 21:50:10 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:34:af:fa:08:ac:62:6c:34:55:58:81:53:3b:23:d2: 71:54:28:8d:19:61:d1:98:be:71:0c:1a:5d:94:48:4d: af:cc:76:82:85:44:1a:21:e1:7f:94:77:8f:91:19:56: 26:0f:af:15:68:b9:76:94:e7:77:dd:15:41:7b:35:fc: f1:23:c5:25:93:df:af:a8:7e:11:bd:5c:08:d0:00:84: 63:c5:23:49:94:08:d0:e8:b9:31:45:97:a9:bf:6d:23: e6:65:52:e7:5d:86:c2:12:fb:c1:57:d1:76:fe:ab:97: 67:c1:c1:12:e1:8b:1e:e4:22:38:90:dd:12:43:ac:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1d:ca:93:44:9c:d0:18:c7:85:83:a9:15:a9:37:76:24: 21:89:6a:36:98:b0:48:c1:0e:ee:55:15:59:69:49:36: 19:e8:a8:4d:75:8a:04:fe:00:35:9a:d6:aa:29:27:55: 5c:cc:9c:c2:3c:9b:d5:cb:7b:97:bc:f7:b8:36:a3:f5: 74:80:a9:8e:e7:b5:14:cd:26:f1:6c:cf:de:cd:22:a9: b8:e0:2e:9b:4d:19:04:7e:45:fe:56:b6:8e:78:0a:a5: 90:6e:14:70:94:e0:39:8c:ec:a4:f6:77:9d:9c:4a:0e: c9:80:79:49:e1:d1:ba:b1:a2:16:61:d8:ad:a5:e3:d5 Fingerprint (MD5): F3:C7:F8:C3:07:81:93:11:5E:AE:A2:D4:57:F4:18:9C Fingerprint (SHA1): A6:14:48:8D:F2:81:8D:57:89:9C:8C:AE:69:B5:49:5B:DB:43:31:C1 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5194: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5195: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174968 (0x137108f8) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:50:11 2012 Not After : Sun Mar 26 21:50:11 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:b0:14:54:92:99:c2:ad:04:78:fd:96:79:94:ba:59: bd:6f:df:8e:3d:86:54:45:e7:b9:89:10:39:d9:d2:93: 54:96:6e:93:43:f3:e1:8b:a6:d5:96:a1:ae:ca:7a:ab: c8:05:de:0c:02:26:e6:b8:0e:50:21:d6:53:90:b5:4a: 16:4b:51:27:9c:35:77:36:7a:d9:5c:a8:4f:f4:c6:b1: da:5e:7a:28:b1:6e:da:f5:e2:db:7c:23:23:aa:1d:d7: f7:a1:a6:0e:5a:d0:39:84:c6:b6:b7:e8:5b:03:18:78: 0c:b0:cb:a7:9e:c9:e4:ed:64:89:4e:ed:3a:f3:ca:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 89:74:8b:d4:47:7c:1e:a5:a4:a1:e7:4c:ca:a5:9c:46: 00:14:cd:02:64:80:4a:5c:3c:60:83:52:4e:8e:b8:03: 66:8e:13:da:31:72:a3:26:c5:2e:38:17:7c:24:56:c3: 3d:38:f1:79:9a:c6:1f:b9:12:e3:39:9c:e3:e9:40:50: 49:59:d2:af:d7:c9:62:17:a4:eb:c9:38:00:7a:08:f4: fe:96:c0:91:97:75:70:2e:99:1e:70:98:ef:d8:37:87: 92:81:f3:f4:35:55:9b:9e:3f:0c:e5:46:5d:1c:95:8d: d7:67:e3:d5:1e:d4:00:e4:1b:cc:04:72:3a:6b:39:90 Fingerprint (MD5): 00:CB:F5:E1:79:4C:D2:C3:85:DA:B9:A5:5F:D9:F7:8E Fingerprint (SHA1): 64:E2:FE:7C:A7:83:EB:53:74:0F:B3:98:A8:95:0C:81:60:94:74:B8 Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #5196: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5197: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5198: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5199: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5200: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174966 (0x137108f6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:50:08 2012 Not After : Sun Mar 26 21:50:08 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:87:0c:c5:58:22:36:cc:b3:21:c3:76:72:49:77:07: 0e:60:0f:b4:e8:e3:74:29:57:46:b3:b4:26:62:9c:1c: b4:b8:3f:4f:fc:84:10:f6:92:bc:04:34:28:09:98:19: 7c:21:b9:a6:5b:0a:43:7f:1b:a8:e9:0d:1d:a8:f6:97: a1:2f:bb:dd:87:dc:fa:bb:86:fc:95:06:23:18:aa:4f: bd:2d:c1:a8:92:13:87:e1:be:0f:9d:cf:7a:d4:24:ba: 75:b1:3f:c7:e8:bb:cb:cc:68:2e:f2:12:5d:b3:75:3a: ad:0e:44:16:0f:75:58:44:fe:77:ca:d4:e5:64:17:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 61:5b:1f:e4:f0:b2:12:f1:7e:86:09:5f:3f:f7:7c:02: 53:26:ed:33:06:42:d6:6e:dd:27:8f:dd:73:66:89:0b: 58:80:5f:83:e7:ae:41:3a:12:5c:f6:52:28:58:3b:ef: 4e:21:84:52:f9:0c:c4:ac:98:30:c2:5f:c6:d5:89:54: d2:e1:2f:05:a2:b6:23:1b:9c:30:3f:8d:5f:47:e7:a8: c0:6f:e0:db:8b:16:79:d7:7c:2d:51:7f:64:16:e4:a5: 83:64:63:53:59:ef:72:6f:aa:81:ad:39:38:dd:e7:2d: a3:67:07:53:7c:ba:3e:83:e3:72:96:70:9d:cb:a2:0b Fingerprint (MD5): 67:A7:C0:23:3D:9D:64:6F:55:C8:F3:26:A8:22:30:45 Fingerprint (SHA1): 67:75:C5:D1:06:EA:A5:24:10:73:BB:9E:F2:2C:B4:69:7C:25:AE:D9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5201: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5202: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174967 (0x137108f7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:50:10 2012 Not After : Sun Mar 26 21:50:10 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:34:af:fa:08:ac:62:6c:34:55:58:81:53:3b:23:d2: 71:54:28:8d:19:61:d1:98:be:71:0c:1a:5d:94:48:4d: af:cc:76:82:85:44:1a:21:e1:7f:94:77:8f:91:19:56: 26:0f:af:15:68:b9:76:94:e7:77:dd:15:41:7b:35:fc: f1:23:c5:25:93:df:af:a8:7e:11:bd:5c:08:d0:00:84: 63:c5:23:49:94:08:d0:e8:b9:31:45:97:a9:bf:6d:23: e6:65:52:e7:5d:86:c2:12:fb:c1:57:d1:76:fe:ab:97: 67:c1:c1:12:e1:8b:1e:e4:22:38:90:dd:12:43:ac:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1d:ca:93:44:9c:d0:18:c7:85:83:a9:15:a9:37:76:24: 21:89:6a:36:98:b0:48:c1:0e:ee:55:15:59:69:49:36: 19:e8:a8:4d:75:8a:04:fe:00:35:9a:d6:aa:29:27:55: 5c:cc:9c:c2:3c:9b:d5:cb:7b:97:bc:f7:b8:36:a3:f5: 74:80:a9:8e:e7:b5:14:cd:26:f1:6c:cf:de:cd:22:a9: b8:e0:2e:9b:4d:19:04:7e:45:fe:56:b6:8e:78:0a:a5: 90:6e:14:70:94:e0:39:8c:ec:a4:f6:77:9d:9c:4a:0e: c9:80:79:49:e1:d1:ba:b1:a2:16:61:d8:ad:a5:e3:d5 Fingerprint (MD5): F3:C7:F8:C3:07:81:93:11:5E:AE:A2:D4:57:F4:18:9C Fingerprint (SHA1): A6:14:48:8D:F2:81:8D:57:89:9C:8C:AE:69:B5:49:5B:DB:43:31:C1 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5203: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5204: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174968 (0x137108f8) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:50:11 2012 Not After : Sun Mar 26 21:50:11 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:b0:14:54:92:99:c2:ad:04:78:fd:96:79:94:ba:59: bd:6f:df:8e:3d:86:54:45:e7:b9:89:10:39:d9:d2:93: 54:96:6e:93:43:f3:e1:8b:a6:d5:96:a1:ae:ca:7a:ab: c8:05:de:0c:02:26:e6:b8:0e:50:21:d6:53:90:b5:4a: 16:4b:51:27:9c:35:77:36:7a:d9:5c:a8:4f:f4:c6:b1: da:5e:7a:28:b1:6e:da:f5:e2:db:7c:23:23:aa:1d:d7: f7:a1:a6:0e:5a:d0:39:84:c6:b6:b7:e8:5b:03:18:78: 0c:b0:cb:a7:9e:c9:e4:ed:64:89:4e:ed:3a:f3:ca:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 89:74:8b:d4:47:7c:1e:a5:a4:a1:e7:4c:ca:a5:9c:46: 00:14:cd:02:64:80:4a:5c:3c:60:83:52:4e:8e:b8:03: 66:8e:13:da:31:72:a3:26:c5:2e:38:17:7c:24:56:c3: 3d:38:f1:79:9a:c6:1f:b9:12:e3:39:9c:e3:e9:40:50: 49:59:d2:af:d7:c9:62:17:a4:eb:c9:38:00:7a:08:f4: fe:96:c0:91:97:75:70:2e:99:1e:70:98:ef:d8:37:87: 92:81:f3:f4:35:55:9b:9e:3f:0c:e5:46:5d:1c:95:8d: d7:67:e3:d5:1e:d4:00:e4:1b:cc:04:72:3a:6b:39:90 Fingerprint (MD5): 00:CB:F5:E1:79:4C:D2:C3:85:DA:B9:A5:5F:D9:F7:8E Fingerprint (SHA1): 64:E2:FE:7C:A7:83:EB:53:74:0F:B3:98:A8:95:0C:81:60:94:74:B8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #5205: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5206: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5207: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326174970 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5208: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5209: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5210: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5211: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326174971 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5212: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5213: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5214: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5215: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174972 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5216: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5217: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #5218: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5219: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 326174973 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5220: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #5221: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #5222: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5223: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 326174974 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5224: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #5225: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5226: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174970 (0x137108fa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:50:15 2012 Not After : Sun Mar 26 21:50:15 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:15:61:e3:3a:63:ce:ec:2c:e7:70:c5:b1:9c:05:48: 3e:2d:5b:c5:16:64:41:79:12:0f:12:77:e7:db:6d:28: 06:b6:da:b2:2e:fe:0a:c7:4e:bc:ed:51:9a:11:a0:70: 1a:1c:51:d6:57:83:70:df:8f:b1:fe:e5:a0:15:6c:02: 94:e2:3b:70:1a:d4:eb:09:38:36:16:92:15:c4:74:01: 76:3a:78:47:19:41:3e:bd:66:39:ed:82:ed:9c:e9:60: d9:ac:4e:06:21:4e:6c:6a:ac:04:cb:5c:23:f5:cf:f9: 9f:15:b3:bd:43:c9:ad:30:d0:90:08:fb:82:71:15:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a4:fb:da:64:a6:4c:54:83:4b:96:da:cb:15:3f:f2:48: c8:73:f0:da:dc:fe:70:24:fb:3f:41:22:a6:8d:38:cf: 12:a8:9b:6f:1f:79:e5:d8:db:5f:6a:ed:a6:fd:72:4e: 65:5a:4f:51:a5:35:5e:ea:04:e7:95:77:26:74:0b:6e: 0b:aa:84:6e:94:07:12:a7:1d:25:be:11:6b:31:22:21: 72:23:88:1e:db:88:63:d1:f0:e4:60:2d:dc:86:de:86: 14:e7:6e:b3:a2:ae:a4:cf:d5:04:44:29:0d:c7:88:49: f9:c5:cc:90:39:07:7f:c6:17:b9:39:68:a7:4f:3b:1f Fingerprint (MD5): 0C:10:8D:29:EC:C2:79:1D:4E:37:F4:C3:E8:53:AB:EF Fingerprint (SHA1): 1B:38:67:FB:0D:DA:00:4C:A8:A7:F7:9B:94:7B:82:75:F6:66:A1:67 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5227: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5228: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174971 (0x137108fb) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:50:16 2012 Not After : Sun Mar 26 21:50:16 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:4a:13:ce:8f:45:d3:5d:8a:c2:77:5b:c6:92:db:91: c6:9f:f0:b8:a6:06:c4:d1:ab:4b:60:75:c6:b4:c1:ae: a5:3a:4d:72:bf:a1:38:db:a0:68:dc:dc:02:be:80:af: 20:ca:d4:6c:1a:80:71:8c:50:c4:c1:b8:22:3e:4b:a1: d4:c3:d4:2c:f0:8e:ee:8e:a2:06:ed:5b:5a:30:a1:97: 2f:41:94:6a:90:54:88:1b:eb:a8:b5:15:e3:08:42:fc: d1:56:89:85:9d:98:2a:b6:74:7b:03:79:b7:3a:bd:5b: 6f:f6:5b:4f:40:d6:bb:84:b0:32:38:dc:f8:b6:9a:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 24:06:9b:a1:95:f5:c8:bf:b9:ac:7f:c3:2c:b6:ba:02: 41:af:43:0e:5d:63:bf:a4:50:ef:bd:5f:ab:46:0a:b4: 3c:2b:b1:e4:46:25:d7:55:1a:a5:33:3b:df:f5:7f:9c: 70:91:74:90:f0:ae:29:b1:a6:56:fd:0b:d2:f8:61:02: 04:0c:69:57:ef:fe:20:90:98:66:74:74:2e:1b:fa:a7: 1b:d9:4d:ba:43:d9:45:3d:50:4b:31:48:3e:3f:2f:47: cf:67:44:29:88:ed:a2:f6:0c:60:36:3b:5c:f5:c9:10: 60:b3:ed:17:70:d5:f0:16:06:d6:61:3a:2f:15:b9:25 Fingerprint (MD5): 22:B7:4C:94:6D:3E:C1:00:1F:85:E9:08:16:50:1F:2A Fingerprint (SHA1): 56:2D:46:63:3E:79:C4:F5:04:A1:E1:6D:9D:98:DC:2A:5E:DA:B7:FB Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5229: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5230: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174972 (0x137108fc) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:50:17 2012 Not After : Sun Mar 26 21:50:17 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:0e:fd:c2:11:a1:42:a1:0e:2d:71:2d:4e:cd:be:1a: 5b:10:9e:05:05:d7:8b:82:ab:07:a8:ca:38:f4:df:ba: 38:82:06:4b:e6:11:d1:a5:d1:7f:04:91:89:3a:4f:e6: 55:73:31:03:82:ab:a0:b3:71:bf:d1:63:f6:ca:a2:de: e5:63:c6:79:a2:fe:4c:49:dd:65:74:f0:dd:c5:95:f7: 16:a6:72:90:1f:a3:74:ea:24:cb:23:48:37:e8:57:8a: b0:f9:f1:43:1d:e4:70:6a:f0:6b:24:cf:9b:20:16:0d: 6a:78:93:4a:12:ce:ea:61:68:2f:ed:49:1b:01:0b:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 01:26:c1:44:f9:91:11:3b:36:98:55:93:ea:cc:cb:83: 12:85:e2:07:61:ee:cf:c4:23:ab:9b:08:9a:82:be:51: 7c:8b:fd:6d:f6:00:c6:2e:5f:86:d6:f8:8a:46:1e:44: 15:16:46:b9:3c:05:f5:f1:16:e6:c3:a1:fa:70:bd:c6: ae:6f:4a:db:e8:77:26:bd:e0:bf:b7:4a:15:79:6b:ba: 02:3c:8b:12:57:e9:93:fc:50:c1:ce:cb:a7:50:ad:e4: ec:7a:90:76:25:98:35:9e:4b:47:88:15:c7:a9:37:59: ef:18:ca:72:4c:eb:4d:14:8b:8d:f9:8c:e2:13:d1:07 Fingerprint (MD5): 55:1C:3F:C0:B6:60:A4:41:EC:E9:98:B9:2D:65:07:D8 Fingerprint (SHA1): 25:61:62:5B:6B:0A:7E:45:4B:90:7F:AF:D8:FB:41:76:BB:C2:72:7D Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #5231: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5232: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5233: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5234: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5235: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174970 (0x137108fa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:50:15 2012 Not After : Sun Mar 26 21:50:15 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:15:61:e3:3a:63:ce:ec:2c:e7:70:c5:b1:9c:05:48: 3e:2d:5b:c5:16:64:41:79:12:0f:12:77:e7:db:6d:28: 06:b6:da:b2:2e:fe:0a:c7:4e:bc:ed:51:9a:11:a0:70: 1a:1c:51:d6:57:83:70:df:8f:b1:fe:e5:a0:15:6c:02: 94:e2:3b:70:1a:d4:eb:09:38:36:16:92:15:c4:74:01: 76:3a:78:47:19:41:3e:bd:66:39:ed:82:ed:9c:e9:60: d9:ac:4e:06:21:4e:6c:6a:ac:04:cb:5c:23:f5:cf:f9: 9f:15:b3:bd:43:c9:ad:30:d0:90:08:fb:82:71:15:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a4:fb:da:64:a6:4c:54:83:4b:96:da:cb:15:3f:f2:48: c8:73:f0:da:dc:fe:70:24:fb:3f:41:22:a6:8d:38:cf: 12:a8:9b:6f:1f:79:e5:d8:db:5f:6a:ed:a6:fd:72:4e: 65:5a:4f:51:a5:35:5e:ea:04:e7:95:77:26:74:0b:6e: 0b:aa:84:6e:94:07:12:a7:1d:25:be:11:6b:31:22:21: 72:23:88:1e:db:88:63:d1:f0:e4:60:2d:dc:86:de:86: 14:e7:6e:b3:a2:ae:a4:cf:d5:04:44:29:0d:c7:88:49: f9:c5:cc:90:39:07:7f:c6:17:b9:39:68:a7:4f:3b:1f Fingerprint (MD5): 0C:10:8D:29:EC:C2:79:1D:4E:37:F4:C3:E8:53:AB:EF Fingerprint (SHA1): 1B:38:67:FB:0D:DA:00:4C:A8:A7:F7:9B:94:7B:82:75:F6:66:A1:67 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5236: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5237: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174971 (0x137108fb) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:50:16 2012 Not After : Sun Mar 26 21:50:16 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:4a:13:ce:8f:45:d3:5d:8a:c2:77:5b:c6:92:db:91: c6:9f:f0:b8:a6:06:c4:d1:ab:4b:60:75:c6:b4:c1:ae: a5:3a:4d:72:bf:a1:38:db:a0:68:dc:dc:02:be:80:af: 20:ca:d4:6c:1a:80:71:8c:50:c4:c1:b8:22:3e:4b:a1: d4:c3:d4:2c:f0:8e:ee:8e:a2:06:ed:5b:5a:30:a1:97: 2f:41:94:6a:90:54:88:1b:eb:a8:b5:15:e3:08:42:fc: d1:56:89:85:9d:98:2a:b6:74:7b:03:79:b7:3a:bd:5b: 6f:f6:5b:4f:40:d6:bb:84:b0:32:38:dc:f8:b6:9a:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 24:06:9b:a1:95:f5:c8:bf:b9:ac:7f:c3:2c:b6:ba:02: 41:af:43:0e:5d:63:bf:a4:50:ef:bd:5f:ab:46:0a:b4: 3c:2b:b1:e4:46:25:d7:55:1a:a5:33:3b:df:f5:7f:9c: 70:91:74:90:f0:ae:29:b1:a6:56:fd:0b:d2:f8:61:02: 04:0c:69:57:ef:fe:20:90:98:66:74:74:2e:1b:fa:a7: 1b:d9:4d:ba:43:d9:45:3d:50:4b:31:48:3e:3f:2f:47: cf:67:44:29:88:ed:a2:f6:0c:60:36:3b:5c:f5:c9:10: 60:b3:ed:17:70:d5:f0:16:06:d6:61:3a:2f:15:b9:25 Fingerprint (MD5): 22:B7:4C:94:6D:3E:C1:00:1F:85:E9:08:16:50:1F:2A Fingerprint (SHA1): 56:2D:46:63:3E:79:C4:F5:04:A1:E1:6D:9D:98:DC:2A:5E:DA:B7:FB Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5238: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5239: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174972 (0x137108fc) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:50:17 2012 Not After : Sun Mar 26 21:50:17 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:0e:fd:c2:11:a1:42:a1:0e:2d:71:2d:4e:cd:be:1a: 5b:10:9e:05:05:d7:8b:82:ab:07:a8:ca:38:f4:df:ba: 38:82:06:4b:e6:11:d1:a5:d1:7f:04:91:89:3a:4f:e6: 55:73:31:03:82:ab:a0:b3:71:bf:d1:63:f6:ca:a2:de: e5:63:c6:79:a2:fe:4c:49:dd:65:74:f0:dd:c5:95:f7: 16:a6:72:90:1f:a3:74:ea:24:cb:23:48:37:e8:57:8a: b0:f9:f1:43:1d:e4:70:6a:f0:6b:24:cf:9b:20:16:0d: 6a:78:93:4a:12:ce:ea:61:68:2f:ed:49:1b:01:0b:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 01:26:c1:44:f9:91:11:3b:36:98:55:93:ea:cc:cb:83: 12:85:e2:07:61:ee:cf:c4:23:ab:9b:08:9a:82:be:51: 7c:8b:fd:6d:f6:00:c6:2e:5f:86:d6:f8:8a:46:1e:44: 15:16:46:b9:3c:05:f5:f1:16:e6:c3:a1:fa:70:bd:c6: ae:6f:4a:db:e8:77:26:bd:e0:bf:b7:4a:15:79:6b:ba: 02:3c:8b:12:57:e9:93:fc:50:c1:ce:cb:a7:50:ad:e4: ec:7a:90:76:25:98:35:9e:4b:47:88:15:c7:a9:37:59: ef:18:ca:72:4c:eb:4d:14:8b:8d:f9:8c:e2:13:d1:07 Fingerprint (MD5): 55:1C:3F:C0:B6:60:A4:41:EC:E9:98:B9:2D:65:07:D8 Fingerprint (SHA1): 25:61:62:5B:6B:0A:7E:45:4B:90:7F:AF:D8:FB:41:76:BB:C2:72:7D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #5240: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5241: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174970 (0x137108fa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:50:15 2012 Not After : Sun Mar 26 21:50:15 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:15:61:e3:3a:63:ce:ec:2c:e7:70:c5:b1:9c:05:48: 3e:2d:5b:c5:16:64:41:79:12:0f:12:77:e7:db:6d:28: 06:b6:da:b2:2e:fe:0a:c7:4e:bc:ed:51:9a:11:a0:70: 1a:1c:51:d6:57:83:70:df:8f:b1:fe:e5:a0:15:6c:02: 94:e2:3b:70:1a:d4:eb:09:38:36:16:92:15:c4:74:01: 76:3a:78:47:19:41:3e:bd:66:39:ed:82:ed:9c:e9:60: d9:ac:4e:06:21:4e:6c:6a:ac:04:cb:5c:23:f5:cf:f9: 9f:15:b3:bd:43:c9:ad:30:d0:90:08:fb:82:71:15:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a4:fb:da:64:a6:4c:54:83:4b:96:da:cb:15:3f:f2:48: c8:73:f0:da:dc:fe:70:24:fb:3f:41:22:a6:8d:38:cf: 12:a8:9b:6f:1f:79:e5:d8:db:5f:6a:ed:a6:fd:72:4e: 65:5a:4f:51:a5:35:5e:ea:04:e7:95:77:26:74:0b:6e: 0b:aa:84:6e:94:07:12:a7:1d:25:be:11:6b:31:22:21: 72:23:88:1e:db:88:63:d1:f0:e4:60:2d:dc:86:de:86: 14:e7:6e:b3:a2:ae:a4:cf:d5:04:44:29:0d:c7:88:49: f9:c5:cc:90:39:07:7f:c6:17:b9:39:68:a7:4f:3b:1f Fingerprint (MD5): 0C:10:8D:29:EC:C2:79:1D:4E:37:F4:C3:E8:53:AB:EF Fingerprint (SHA1): 1B:38:67:FB:0D:DA:00:4C:A8:A7:F7:9B:94:7B:82:75:F6:66:A1:67 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5242: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174970 (0x137108fa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:50:15 2012 Not After : Sun Mar 26 21:50:15 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:15:61:e3:3a:63:ce:ec:2c:e7:70:c5:b1:9c:05:48: 3e:2d:5b:c5:16:64:41:79:12:0f:12:77:e7:db:6d:28: 06:b6:da:b2:2e:fe:0a:c7:4e:bc:ed:51:9a:11:a0:70: 1a:1c:51:d6:57:83:70:df:8f:b1:fe:e5:a0:15:6c:02: 94:e2:3b:70:1a:d4:eb:09:38:36:16:92:15:c4:74:01: 76:3a:78:47:19:41:3e:bd:66:39:ed:82:ed:9c:e9:60: d9:ac:4e:06:21:4e:6c:6a:ac:04:cb:5c:23:f5:cf:f9: 9f:15:b3:bd:43:c9:ad:30:d0:90:08:fb:82:71:15:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a4:fb:da:64:a6:4c:54:83:4b:96:da:cb:15:3f:f2:48: c8:73:f0:da:dc:fe:70:24:fb:3f:41:22:a6:8d:38:cf: 12:a8:9b:6f:1f:79:e5:d8:db:5f:6a:ed:a6:fd:72:4e: 65:5a:4f:51:a5:35:5e:ea:04:e7:95:77:26:74:0b:6e: 0b:aa:84:6e:94:07:12:a7:1d:25:be:11:6b:31:22:21: 72:23:88:1e:db:88:63:d1:f0:e4:60:2d:dc:86:de:86: 14:e7:6e:b3:a2:ae:a4:cf:d5:04:44:29:0d:c7:88:49: f9:c5:cc:90:39:07:7f:c6:17:b9:39:68:a7:4f:3b:1f Fingerprint (MD5): 0C:10:8D:29:EC:C2:79:1D:4E:37:F4:C3:E8:53:AB:EF Fingerprint (SHA1): 1B:38:67:FB:0D:DA:00:4C:A8:A7:F7:9B:94:7B:82:75:F6:66:A1:67 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5243: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174971 (0x137108fb) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:50:16 2012 Not After : Sun Mar 26 21:50:16 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:4a:13:ce:8f:45:d3:5d:8a:c2:77:5b:c6:92:db:91: c6:9f:f0:b8:a6:06:c4:d1:ab:4b:60:75:c6:b4:c1:ae: a5:3a:4d:72:bf:a1:38:db:a0:68:dc:dc:02:be:80:af: 20:ca:d4:6c:1a:80:71:8c:50:c4:c1:b8:22:3e:4b:a1: d4:c3:d4:2c:f0:8e:ee:8e:a2:06:ed:5b:5a:30:a1:97: 2f:41:94:6a:90:54:88:1b:eb:a8:b5:15:e3:08:42:fc: d1:56:89:85:9d:98:2a:b6:74:7b:03:79:b7:3a:bd:5b: 6f:f6:5b:4f:40:d6:bb:84:b0:32:38:dc:f8:b6:9a:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 24:06:9b:a1:95:f5:c8:bf:b9:ac:7f:c3:2c:b6:ba:02: 41:af:43:0e:5d:63:bf:a4:50:ef:bd:5f:ab:46:0a:b4: 3c:2b:b1:e4:46:25:d7:55:1a:a5:33:3b:df:f5:7f:9c: 70:91:74:90:f0:ae:29:b1:a6:56:fd:0b:d2:f8:61:02: 04:0c:69:57:ef:fe:20:90:98:66:74:74:2e:1b:fa:a7: 1b:d9:4d:ba:43:d9:45:3d:50:4b:31:48:3e:3f:2f:47: cf:67:44:29:88:ed:a2:f6:0c:60:36:3b:5c:f5:c9:10: 60:b3:ed:17:70:d5:f0:16:06:d6:61:3a:2f:15:b9:25 Fingerprint (MD5): 22:B7:4C:94:6D:3E:C1:00:1F:85:E9:08:16:50:1F:2A Fingerprint (SHA1): 56:2D:46:63:3E:79:C4:F5:04:A1:E1:6D:9D:98:DC:2A:5E:DA:B7:FB Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5244: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174971 (0x137108fb) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:50:16 2012 Not After : Sun Mar 26 21:50:16 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:4a:13:ce:8f:45:d3:5d:8a:c2:77:5b:c6:92:db:91: c6:9f:f0:b8:a6:06:c4:d1:ab:4b:60:75:c6:b4:c1:ae: a5:3a:4d:72:bf:a1:38:db:a0:68:dc:dc:02:be:80:af: 20:ca:d4:6c:1a:80:71:8c:50:c4:c1:b8:22:3e:4b:a1: d4:c3:d4:2c:f0:8e:ee:8e:a2:06:ed:5b:5a:30:a1:97: 2f:41:94:6a:90:54:88:1b:eb:a8:b5:15:e3:08:42:fc: d1:56:89:85:9d:98:2a:b6:74:7b:03:79:b7:3a:bd:5b: 6f:f6:5b:4f:40:d6:bb:84:b0:32:38:dc:f8:b6:9a:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 24:06:9b:a1:95:f5:c8:bf:b9:ac:7f:c3:2c:b6:ba:02: 41:af:43:0e:5d:63:bf:a4:50:ef:bd:5f:ab:46:0a:b4: 3c:2b:b1:e4:46:25:d7:55:1a:a5:33:3b:df:f5:7f:9c: 70:91:74:90:f0:ae:29:b1:a6:56:fd:0b:d2:f8:61:02: 04:0c:69:57:ef:fe:20:90:98:66:74:74:2e:1b:fa:a7: 1b:d9:4d:ba:43:d9:45:3d:50:4b:31:48:3e:3f:2f:47: cf:67:44:29:88:ed:a2:f6:0c:60:36:3b:5c:f5:c9:10: 60:b3:ed:17:70:d5:f0:16:06:d6:61:3a:2f:15:b9:25 Fingerprint (MD5): 22:B7:4C:94:6D:3E:C1:00:1F:85:E9:08:16:50:1F:2A Fingerprint (SHA1): 56:2D:46:63:3E:79:C4:F5:04:A1:E1:6D:9D:98:DC:2A:5E:DA:B7:FB Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5245: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174972 (0x137108fc) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:50:17 2012 Not After : Sun Mar 26 21:50:17 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:0e:fd:c2:11:a1:42:a1:0e:2d:71:2d:4e:cd:be:1a: 5b:10:9e:05:05:d7:8b:82:ab:07:a8:ca:38:f4:df:ba: 38:82:06:4b:e6:11:d1:a5:d1:7f:04:91:89:3a:4f:e6: 55:73:31:03:82:ab:a0:b3:71:bf:d1:63:f6:ca:a2:de: e5:63:c6:79:a2:fe:4c:49:dd:65:74:f0:dd:c5:95:f7: 16:a6:72:90:1f:a3:74:ea:24:cb:23:48:37:e8:57:8a: b0:f9:f1:43:1d:e4:70:6a:f0:6b:24:cf:9b:20:16:0d: 6a:78:93:4a:12:ce:ea:61:68:2f:ed:49:1b:01:0b:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 01:26:c1:44:f9:91:11:3b:36:98:55:93:ea:cc:cb:83: 12:85:e2:07:61:ee:cf:c4:23:ab:9b:08:9a:82:be:51: 7c:8b:fd:6d:f6:00:c6:2e:5f:86:d6:f8:8a:46:1e:44: 15:16:46:b9:3c:05:f5:f1:16:e6:c3:a1:fa:70:bd:c6: ae:6f:4a:db:e8:77:26:bd:e0:bf:b7:4a:15:79:6b:ba: 02:3c:8b:12:57:e9:93:fc:50:c1:ce:cb:a7:50:ad:e4: ec:7a:90:76:25:98:35:9e:4b:47:88:15:c7:a9:37:59: ef:18:ca:72:4c:eb:4d:14:8b:8d:f9:8c:e2:13:d1:07 Fingerprint (MD5): 55:1C:3F:C0:B6:60:A4:41:EC:E9:98:B9:2D:65:07:D8 Fingerprint (SHA1): 25:61:62:5B:6B:0A:7E:45:4B:90:7F:AF:D8:FB:41:76:BB:C2:72:7D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #5246: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174972 (0x137108fc) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:50:17 2012 Not After : Sun Mar 26 21:50:17 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:0e:fd:c2:11:a1:42:a1:0e:2d:71:2d:4e:cd:be:1a: 5b:10:9e:05:05:d7:8b:82:ab:07:a8:ca:38:f4:df:ba: 38:82:06:4b:e6:11:d1:a5:d1:7f:04:91:89:3a:4f:e6: 55:73:31:03:82:ab:a0:b3:71:bf:d1:63:f6:ca:a2:de: e5:63:c6:79:a2:fe:4c:49:dd:65:74:f0:dd:c5:95:f7: 16:a6:72:90:1f:a3:74:ea:24:cb:23:48:37:e8:57:8a: b0:f9:f1:43:1d:e4:70:6a:f0:6b:24:cf:9b:20:16:0d: 6a:78:93:4a:12:ce:ea:61:68:2f:ed:49:1b:01:0b:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 01:26:c1:44:f9:91:11:3b:36:98:55:93:ea:cc:cb:83: 12:85:e2:07:61:ee:cf:c4:23:ab:9b:08:9a:82:be:51: 7c:8b:fd:6d:f6:00:c6:2e:5f:86:d6:f8:8a:46:1e:44: 15:16:46:b9:3c:05:f5:f1:16:e6:c3:a1:fa:70:bd:c6: ae:6f:4a:db:e8:77:26:bd:e0:bf:b7:4a:15:79:6b:ba: 02:3c:8b:12:57:e9:93:fc:50:c1:ce:cb:a7:50:ad:e4: ec:7a:90:76:25:98:35:9e:4b:47:88:15:c7:a9:37:59: ef:18:ca:72:4c:eb:4d:14:8b:8d:f9:8c:e2:13:d1:07 Fingerprint (MD5): 55:1C:3F:C0:B6:60:A4:41:EC:E9:98:B9:2D:65:07:D8 Fingerprint (SHA1): 25:61:62:5B:6B:0A:7E:45:4B:90:7F:AF:D8:FB:41:76:BB:C2:72:7D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #5247: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #5248: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326174975 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5249: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #5250: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5251: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5252: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 326174976 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5253: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #5254: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5255: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5256: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326174977 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5257: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5258: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #5259: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5260: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 326174978 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5261: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der chains.sh: #5262: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #5263: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5264: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 326174979 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5265: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #5266: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #5267: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5268: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 326174980 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5269: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #5270: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #5271: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5272: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 326174981 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5273: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der chains.sh: #5274: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5275: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #5276: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #5277: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5278: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #5279: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174975 (0x137108ff) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:d3:d5:6b:38:d0:35:35:df:1e:8f:27:e9:09:ad:0c: 3b:de:4c:8c:25:af:69:41:bc:04:ba:1a:99:b0:c8:74: b2:f5:cb:d1:3f:1c:d4:d1:2a:63:4b:5b:dc:02:53:c7: 70:f3:51:0c:b9:ea:3e:d4:6a:4b:f8:04:0c:08:9a:09: 95:41:76:5e:18:de:1a:64:5b:a0:00:15:fb:b9:af:fa: c3:b8:bc:bd:50:bd:99:ba:36:8e:15:0d:6c:55:75:cc: 35:22:44:58:a0:46:03:f8:1f:a2:09:18:ad:64:a5:86: c5:7d:cf:f9:4a:42:4c:29:d1:cb:b7:f5:6e:53:57:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 14:bf:36:11:e3:1c:a2:3f:2a:ad:be:0f:e2:19:bb:66: d1:41:0b:92:d3:8d:c4:a1:d0:90:be:89:4b:9c:88:1d: 4a:92:e6:a8:b7:17:6b:aa:60:a5:bb:07:34:0b:f7:5b: d5:95:9b:e7:fd:f7:9e:93:5a:10:ea:d6:b4:65:53:ea: 99:f1:9b:04:e7:41:c5:9c:d6:e9:47:c4:d7:a2:06:90: 47:ff:28:0b:91:e7:07:ff:85:36:89:ed:0c:e2:a8:d8: 8a:49:17:26:c8:ab:af:84:c6:c9:7d:06:23:bb:46:3b: 5c:38:ef:f2:a8:8d:05:a9:fe:0c:44:ad:c8:74:d8:d8 Fingerprint (MD5): BD:AE:E3:A3:B8:F1:08:4E:5C:1D:CF:24:D3:DF:C8:67 Fingerprint (SHA1): A9:5B:B1:9F:3B:EE:77:6C:14:E5:57:AD:BE:EC:FC:36:58:FF:FB:DD Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5280: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5281: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5282: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5283: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174975 (0x137108ff) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:50:23 2012 Not After : Sun Mar 26 21:50:23 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:d3:d5:6b:38:d0:35:35:df:1e:8f:27:e9:09:ad:0c: 3b:de:4c:8c:25:af:69:41:bc:04:ba:1a:99:b0:c8:74: b2:f5:cb:d1:3f:1c:d4:d1:2a:63:4b:5b:dc:02:53:c7: 70:f3:51:0c:b9:ea:3e:d4:6a:4b:f8:04:0c:08:9a:09: 95:41:76:5e:18:de:1a:64:5b:a0:00:15:fb:b9:af:fa: c3:b8:bc:bd:50:bd:99:ba:36:8e:15:0d:6c:55:75:cc: 35:22:44:58:a0:46:03:f8:1f:a2:09:18:ad:64:a5:86: c5:7d:cf:f9:4a:42:4c:29:d1:cb:b7:f5:6e:53:57:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 14:bf:36:11:e3:1c:a2:3f:2a:ad:be:0f:e2:19:bb:66: d1:41:0b:92:d3:8d:c4:a1:d0:90:be:89:4b:9c:88:1d: 4a:92:e6:a8:b7:17:6b:aa:60:a5:bb:07:34:0b:f7:5b: d5:95:9b:e7:fd:f7:9e:93:5a:10:ea:d6:b4:65:53:ea: 99:f1:9b:04:e7:41:c5:9c:d6:e9:47:c4:d7:a2:06:90: 47:ff:28:0b:91:e7:07:ff:85:36:89:ed:0c:e2:a8:d8: 8a:49:17:26:c8:ab:af:84:c6:c9:7d:06:23:bb:46:3b: 5c:38:ef:f2:a8:8d:05:a9:fe:0c:44:ad:c8:74:d8:d8 Fingerprint (MD5): BD:AE:E3:A3:B8:F1:08:4E:5C:1D:CF:24:D3:DF:C8:67 Fingerprint (SHA1): A9:5B:B1:9F:3B:EE:77:6C:14:E5:57:AD:BE:EC:FC:36:58:FF:FB:DD Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5284: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5285: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #5286: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326174982 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5287: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #5288: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5289: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5290: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 326174983 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5291: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #5292: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #5293: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 326174984 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5295: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der chains.sh: #5296: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #5297: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 326174985 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5299: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der chains.sh: #5300: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5301: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5302: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 326174986 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5303: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der chains.sh: #5304: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #5305: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5306: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 326174987 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5307: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der chains.sh: #5308: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #5309: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 326174988 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5311: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der chains.sh: #5312: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5313: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5314: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 326174989 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5315: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der chains.sh: #5316: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #5317: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5318: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 326174990 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5319: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der chains.sh: #5320: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #5321: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 326174991 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5323: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der chains.sh: #5324: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #5325: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5326: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 326174992 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5327: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der chains.sh: #5328: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #5329: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5330: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 326174993 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5331: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der chains.sh: #5332: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #5333: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 326174994 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5335: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der chains.sh: #5336: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #5337: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5338: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 326174995 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5339: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der chains.sh: #5340: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #5341: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5342: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 326174996 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5343: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der chains.sh: #5344: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #5345: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5346: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 326174997 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5347: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der chains.sh: #5348: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #5349: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5350: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 326174998 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5351: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der chains.sh: #5352: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #5353: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5354: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 326174999 --extCP --extIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5355: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der chains.sh: #5356: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #5357: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 326175000 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5359: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der chains.sh: #5360: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #5361: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5362: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 326175001 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5363: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der chains.sh: #5364: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #5365: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5366: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 326175002 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5367: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der chains.sh: #5368: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #5369: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5370: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 326175003 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5371: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der chains.sh: #5372: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #5373: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5374: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 326175004 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5375: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der chains.sh: #5376: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #5377: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5378: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 326175005 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5379: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der chains.sh: #5380: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #5381: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5382: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 326175006 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5383: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der chains.sh: #5384: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #5385: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5386: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 326175007 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5387: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der chains.sh: #5388: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #5389: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5390: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 326175008 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5391: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der chains.sh: #5392: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #5393: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5394: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 326175009 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5395: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der chains.sh: #5396: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #5397: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5398: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 326175010 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5399: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der chains.sh: #5400: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #5401: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5402: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 326175011 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5403: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der chains.sh: #5404: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5405: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174982 (0x13710906) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:50:32 2012 Not After : Sun Mar 26 21:50:32 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:4e:82:a2:e5:de:4c:da:41:ee:00:fe:0d:25:38:6b: 39:e3:3f:7a:45:b6:9e:08:08:79:d4:77:60:50:01:ae: 79:7e:83:6a:a2:30:c1:f9:7f:3b:0e:84:4a:65:67:97: b7:0a:a6:2f:b4:85:36:5e:7a:7c:04:88:29:95:b7:33: 81:e2:24:21:42:06:da:e8:ac:34:e7:fe:1a:c6:36:98: 30:43:d5:22:ad:79:93:4a:a2:3a:45:9a:06:cf:b3:c8: 65:5e:90:24:fc:37:90:06:77:b4:19:17:c1:cf:26:53: d7:62:f0:1c:b3:02:28:82:52:e0:cc:af:78:7e:8a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c1:43:36:a7:31:6e:bf:33:78:28:da:13:cb:dd:67:2a: 96:89:29:40:6f:3c:25:98:e5:7c:1c:67:26:f4:b3:5e: fd:9e:d7:fd:a8:81:37:67:80:65:54:bd:fd:a0:c8:e6: 27:72:28:d3:36:3b:0e:51:dc:6d:55:78:84:b6:98:0d: 46:0d:bf:b1:d3:f0:9a:3d:77:fb:e7:7a:ae:eb:84:ee: a0:0c:0c:2e:ce:8d:69:f9:ef:e8:57:f3:19:09:f9:f4: 0e:ed:e0:d1:fd:8b:50:e3:8a:df:fc:ac:84:df:c2:56: db:b5:1b:1f:87:0f:9b:52:f0:e2:1f:af:54:b2:aa:e9 Fingerprint (MD5): 39:C8:4D:B3:9B:17:9E:31:34:C1:02:85:E7:E9:A1:48 Fingerprint (SHA1): 8C:F5:6D:E0:22:76:FC:51:74:5F:97:35:16:5B:2F:01:F5:DC:0F:A5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5406: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5407: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174982 (0x13710906) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:50:32 2012 Not After : Sun Mar 26 21:50:32 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:4e:82:a2:e5:de:4c:da:41:ee:00:fe:0d:25:38:6b: 39:e3:3f:7a:45:b6:9e:08:08:79:d4:77:60:50:01:ae: 79:7e:83:6a:a2:30:c1:f9:7f:3b:0e:84:4a:65:67:97: b7:0a:a6:2f:b4:85:36:5e:7a:7c:04:88:29:95:b7:33: 81:e2:24:21:42:06:da:e8:ac:34:e7:fe:1a:c6:36:98: 30:43:d5:22:ad:79:93:4a:a2:3a:45:9a:06:cf:b3:c8: 65:5e:90:24:fc:37:90:06:77:b4:19:17:c1:cf:26:53: d7:62:f0:1c:b3:02:28:82:52:e0:cc:af:78:7e:8a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c1:43:36:a7:31:6e:bf:33:78:28:da:13:cb:dd:67:2a: 96:89:29:40:6f:3c:25:98:e5:7c:1c:67:26:f4:b3:5e: fd:9e:d7:fd:a8:81:37:67:80:65:54:bd:fd:a0:c8:e6: 27:72:28:d3:36:3b:0e:51:dc:6d:55:78:84:b6:98:0d: 46:0d:bf:b1:d3:f0:9a:3d:77:fb:e7:7a:ae:eb:84:ee: a0:0c:0c:2e:ce:8d:69:f9:ef:e8:57:f3:19:09:f9:f4: 0e:ed:e0:d1:fd:8b:50:e3:8a:df:fc:ac:84:df:c2:56: db:b5:1b:1f:87:0f:9b:52:f0:e2:1f:af:54:b2:aa:e9 Fingerprint (MD5): 39:C8:4D:B3:9B:17:9E:31:34:C1:02:85:E7:E9:A1:48 Fingerprint (SHA1): 8C:F5:6D:E0:22:76:FC:51:74:5F:97:35:16:5B:2F:01:F5:DC:0F:A5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5408: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5409: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5410: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5411: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174982 (0x13710906) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:50:32 2012 Not After : Sun Mar 26 21:50:32 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:4e:82:a2:e5:de:4c:da:41:ee:00:fe:0d:25:38:6b: 39:e3:3f:7a:45:b6:9e:08:08:79:d4:77:60:50:01:ae: 79:7e:83:6a:a2:30:c1:f9:7f:3b:0e:84:4a:65:67:97: b7:0a:a6:2f:b4:85:36:5e:7a:7c:04:88:29:95:b7:33: 81:e2:24:21:42:06:da:e8:ac:34:e7:fe:1a:c6:36:98: 30:43:d5:22:ad:79:93:4a:a2:3a:45:9a:06:cf:b3:c8: 65:5e:90:24:fc:37:90:06:77:b4:19:17:c1:cf:26:53: d7:62:f0:1c:b3:02:28:82:52:e0:cc:af:78:7e:8a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c1:43:36:a7:31:6e:bf:33:78:28:da:13:cb:dd:67:2a: 96:89:29:40:6f:3c:25:98:e5:7c:1c:67:26:f4:b3:5e: fd:9e:d7:fd:a8:81:37:67:80:65:54:bd:fd:a0:c8:e6: 27:72:28:d3:36:3b:0e:51:dc:6d:55:78:84:b6:98:0d: 46:0d:bf:b1:d3:f0:9a:3d:77:fb:e7:7a:ae:eb:84:ee: a0:0c:0c:2e:ce:8d:69:f9:ef:e8:57:f3:19:09:f9:f4: 0e:ed:e0:d1:fd:8b:50:e3:8a:df:fc:ac:84:df:c2:56: db:b5:1b:1f:87:0f:9b:52:f0:e2:1f:af:54:b2:aa:e9 Fingerprint (MD5): 39:C8:4D:B3:9B:17:9E:31:34:C1:02:85:E7:E9:A1:48 Fingerprint (SHA1): 8C:F5:6D:E0:22:76:FC:51:74:5F:97:35:16:5B:2F:01:F5:DC:0F:A5 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5412: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5413: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5414: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5415: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174982 (0x13710906) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:50:32 2012 Not After : Sun Mar 26 21:50:32 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:4e:82:a2:e5:de:4c:da:41:ee:00:fe:0d:25:38:6b: 39:e3:3f:7a:45:b6:9e:08:08:79:d4:77:60:50:01:ae: 79:7e:83:6a:a2:30:c1:f9:7f:3b:0e:84:4a:65:67:97: b7:0a:a6:2f:b4:85:36:5e:7a:7c:04:88:29:95:b7:33: 81:e2:24:21:42:06:da:e8:ac:34:e7:fe:1a:c6:36:98: 30:43:d5:22:ad:79:93:4a:a2:3a:45:9a:06:cf:b3:c8: 65:5e:90:24:fc:37:90:06:77:b4:19:17:c1:cf:26:53: d7:62:f0:1c:b3:02:28:82:52:e0:cc:af:78:7e:8a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c1:43:36:a7:31:6e:bf:33:78:28:da:13:cb:dd:67:2a: 96:89:29:40:6f:3c:25:98:e5:7c:1c:67:26:f4:b3:5e: fd:9e:d7:fd:a8:81:37:67:80:65:54:bd:fd:a0:c8:e6: 27:72:28:d3:36:3b:0e:51:dc:6d:55:78:84:b6:98:0d: 46:0d:bf:b1:d3:f0:9a:3d:77:fb:e7:7a:ae:eb:84:ee: a0:0c:0c:2e:ce:8d:69:f9:ef:e8:57:f3:19:09:f9:f4: 0e:ed:e0:d1:fd:8b:50:e3:8a:df:fc:ac:84:df:c2:56: db:b5:1b:1f:87:0f:9b:52:f0:e2:1f:af:54:b2:aa:e9 Fingerprint (MD5): 39:C8:4D:B3:9B:17:9E:31:34:C1:02:85:E7:E9:A1:48 Fingerprint (SHA1): 8C:F5:6D:E0:22:76:FC:51:74:5F:97:35:16:5B:2F:01:F5:DC:0F:A5 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5416: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174982 (0x13710906) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:50:32 2012 Not After : Sun Mar 26 21:50:32 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:4e:82:a2:e5:de:4c:da:41:ee:00:fe:0d:25:38:6b: 39:e3:3f:7a:45:b6:9e:08:08:79:d4:77:60:50:01:ae: 79:7e:83:6a:a2:30:c1:f9:7f:3b:0e:84:4a:65:67:97: b7:0a:a6:2f:b4:85:36:5e:7a:7c:04:88:29:95:b7:33: 81:e2:24:21:42:06:da:e8:ac:34:e7:fe:1a:c6:36:98: 30:43:d5:22:ad:79:93:4a:a2:3a:45:9a:06:cf:b3:c8: 65:5e:90:24:fc:37:90:06:77:b4:19:17:c1:cf:26:53: d7:62:f0:1c:b3:02:28:82:52:e0:cc:af:78:7e:8a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c1:43:36:a7:31:6e:bf:33:78:28:da:13:cb:dd:67:2a: 96:89:29:40:6f:3c:25:98:e5:7c:1c:67:26:f4:b3:5e: fd:9e:d7:fd:a8:81:37:67:80:65:54:bd:fd:a0:c8:e6: 27:72:28:d3:36:3b:0e:51:dc:6d:55:78:84:b6:98:0d: 46:0d:bf:b1:d3:f0:9a:3d:77:fb:e7:7a:ae:eb:84:ee: a0:0c:0c:2e:ce:8d:69:f9:ef:e8:57:f3:19:09:f9:f4: 0e:ed:e0:d1:fd:8b:50:e3:8a:df:fc:ac:84:df:c2:56: db:b5:1b:1f:87:0f:9b:52:f0:e2:1f:af:54:b2:aa:e9 Fingerprint (MD5): 39:C8:4D:B3:9B:17:9E:31:34:C1:02:85:E7:E9:A1:48 Fingerprint (SHA1): 8C:F5:6D:E0:22:76:FC:51:74:5F:97:35:16:5B:2F:01:F5:DC:0F:A5 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5417: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5418: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174982 (0x13710906) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:50:32 2012 Not After : Sun Mar 26 21:50:32 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:4e:82:a2:e5:de:4c:da:41:ee:00:fe:0d:25:38:6b: 39:e3:3f:7a:45:b6:9e:08:08:79:d4:77:60:50:01:ae: 79:7e:83:6a:a2:30:c1:f9:7f:3b:0e:84:4a:65:67:97: b7:0a:a6:2f:b4:85:36:5e:7a:7c:04:88:29:95:b7:33: 81:e2:24:21:42:06:da:e8:ac:34:e7:fe:1a:c6:36:98: 30:43:d5:22:ad:79:93:4a:a2:3a:45:9a:06:cf:b3:c8: 65:5e:90:24:fc:37:90:06:77:b4:19:17:c1:cf:26:53: d7:62:f0:1c:b3:02:28:82:52:e0:cc:af:78:7e:8a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c1:43:36:a7:31:6e:bf:33:78:28:da:13:cb:dd:67:2a: 96:89:29:40:6f:3c:25:98:e5:7c:1c:67:26:f4:b3:5e: fd:9e:d7:fd:a8:81:37:67:80:65:54:bd:fd:a0:c8:e6: 27:72:28:d3:36:3b:0e:51:dc:6d:55:78:84:b6:98:0d: 46:0d:bf:b1:d3:f0:9a:3d:77:fb:e7:7a:ae:eb:84:ee: a0:0c:0c:2e:ce:8d:69:f9:ef:e8:57:f3:19:09:f9:f4: 0e:ed:e0:d1:fd:8b:50:e3:8a:df:fc:ac:84:df:c2:56: db:b5:1b:1f:87:0f:9b:52:f0:e2:1f:af:54:b2:aa:e9 Fingerprint (MD5): 39:C8:4D:B3:9B:17:9E:31:34:C1:02:85:E7:E9:A1:48 Fingerprint (SHA1): 8C:F5:6D:E0:22:76:FC:51:74:5F:97:35:16:5B:2F:01:F5:DC:0F:A5 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5419: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5420: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5421: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5422: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174982 (0x13710906) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:50:32 2012 Not After : Sun Mar 26 21:50:32 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:4e:82:a2:e5:de:4c:da:41:ee:00:fe:0d:25:38:6b: 39:e3:3f:7a:45:b6:9e:08:08:79:d4:77:60:50:01:ae: 79:7e:83:6a:a2:30:c1:f9:7f:3b:0e:84:4a:65:67:97: b7:0a:a6:2f:b4:85:36:5e:7a:7c:04:88:29:95:b7:33: 81:e2:24:21:42:06:da:e8:ac:34:e7:fe:1a:c6:36:98: 30:43:d5:22:ad:79:93:4a:a2:3a:45:9a:06:cf:b3:c8: 65:5e:90:24:fc:37:90:06:77:b4:19:17:c1:cf:26:53: d7:62:f0:1c:b3:02:28:82:52:e0:cc:af:78:7e:8a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c1:43:36:a7:31:6e:bf:33:78:28:da:13:cb:dd:67:2a: 96:89:29:40:6f:3c:25:98:e5:7c:1c:67:26:f4:b3:5e: fd:9e:d7:fd:a8:81:37:67:80:65:54:bd:fd:a0:c8:e6: 27:72:28:d3:36:3b:0e:51:dc:6d:55:78:84:b6:98:0d: 46:0d:bf:b1:d3:f0:9a:3d:77:fb:e7:7a:ae:eb:84:ee: a0:0c:0c:2e:ce:8d:69:f9:ef:e8:57:f3:19:09:f9:f4: 0e:ed:e0:d1:fd:8b:50:e3:8a:df:fc:ac:84:df:c2:56: db:b5:1b:1f:87:0f:9b:52:f0:e2:1f:af:54:b2:aa:e9 Fingerprint (MD5): 39:C8:4D:B3:9B:17:9E:31:34:C1:02:85:E7:E9:A1:48 Fingerprint (SHA1): 8C:F5:6D:E0:22:76:FC:51:74:5F:97:35:16:5B:2F:01:F5:DC:0F:A5 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5423: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174982 (0x13710906) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:50:32 2012 Not After : Sun Mar 26 21:50:32 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:4e:82:a2:e5:de:4c:da:41:ee:00:fe:0d:25:38:6b: 39:e3:3f:7a:45:b6:9e:08:08:79:d4:77:60:50:01:ae: 79:7e:83:6a:a2:30:c1:f9:7f:3b:0e:84:4a:65:67:97: b7:0a:a6:2f:b4:85:36:5e:7a:7c:04:88:29:95:b7:33: 81:e2:24:21:42:06:da:e8:ac:34:e7:fe:1a:c6:36:98: 30:43:d5:22:ad:79:93:4a:a2:3a:45:9a:06:cf:b3:c8: 65:5e:90:24:fc:37:90:06:77:b4:19:17:c1:cf:26:53: d7:62:f0:1c:b3:02:28:82:52:e0:cc:af:78:7e:8a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c1:43:36:a7:31:6e:bf:33:78:28:da:13:cb:dd:67:2a: 96:89:29:40:6f:3c:25:98:e5:7c:1c:67:26:f4:b3:5e: fd:9e:d7:fd:a8:81:37:67:80:65:54:bd:fd:a0:c8:e6: 27:72:28:d3:36:3b:0e:51:dc:6d:55:78:84:b6:98:0d: 46:0d:bf:b1:d3:f0:9a:3d:77:fb:e7:7a:ae:eb:84:ee: a0:0c:0c:2e:ce:8d:69:f9:ef:e8:57:f3:19:09:f9:f4: 0e:ed:e0:d1:fd:8b:50:e3:8a:df:fc:ac:84:df:c2:56: db:b5:1b:1f:87:0f:9b:52:f0:e2:1f:af:54:b2:aa:e9 Fingerprint (MD5): 39:C8:4D:B3:9B:17:9E:31:34:C1:02:85:E7:E9:A1:48 Fingerprint (SHA1): 8C:F5:6D:E0:22:76:FC:51:74:5F:97:35:16:5B:2F:01:F5:DC:0F:A5 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5424: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174982 (0x13710906) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:50:32 2012 Not After : Sun Mar 26 21:50:32 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:4e:82:a2:e5:de:4c:da:41:ee:00:fe:0d:25:38:6b: 39:e3:3f:7a:45:b6:9e:08:08:79:d4:77:60:50:01:ae: 79:7e:83:6a:a2:30:c1:f9:7f:3b:0e:84:4a:65:67:97: b7:0a:a6:2f:b4:85:36:5e:7a:7c:04:88:29:95:b7:33: 81:e2:24:21:42:06:da:e8:ac:34:e7:fe:1a:c6:36:98: 30:43:d5:22:ad:79:93:4a:a2:3a:45:9a:06:cf:b3:c8: 65:5e:90:24:fc:37:90:06:77:b4:19:17:c1:cf:26:53: d7:62:f0:1c:b3:02:28:82:52:e0:cc:af:78:7e:8a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c1:43:36:a7:31:6e:bf:33:78:28:da:13:cb:dd:67:2a: 96:89:29:40:6f:3c:25:98:e5:7c:1c:67:26:f4:b3:5e: fd:9e:d7:fd:a8:81:37:67:80:65:54:bd:fd:a0:c8:e6: 27:72:28:d3:36:3b:0e:51:dc:6d:55:78:84:b6:98:0d: 46:0d:bf:b1:d3:f0:9a:3d:77:fb:e7:7a:ae:eb:84:ee: a0:0c:0c:2e:ce:8d:69:f9:ef:e8:57:f3:19:09:f9:f4: 0e:ed:e0:d1:fd:8b:50:e3:8a:df:fc:ac:84:df:c2:56: db:b5:1b:1f:87:0f:9b:52:f0:e2:1f:af:54:b2:aa:e9 Fingerprint (MD5): 39:C8:4D:B3:9B:17:9E:31:34:C1:02:85:E7:E9:A1:48 Fingerprint (SHA1): 8C:F5:6D:E0:22:76:FC:51:74:5F:97:35:16:5B:2F:01:F5:DC:0F:A5 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5425: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174982 (0x13710906) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:50:32 2012 Not After : Sun Mar 26 21:50:32 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:4e:82:a2:e5:de:4c:da:41:ee:00:fe:0d:25:38:6b: 39:e3:3f:7a:45:b6:9e:08:08:79:d4:77:60:50:01:ae: 79:7e:83:6a:a2:30:c1:f9:7f:3b:0e:84:4a:65:67:97: b7:0a:a6:2f:b4:85:36:5e:7a:7c:04:88:29:95:b7:33: 81:e2:24:21:42:06:da:e8:ac:34:e7:fe:1a:c6:36:98: 30:43:d5:22:ad:79:93:4a:a2:3a:45:9a:06:cf:b3:c8: 65:5e:90:24:fc:37:90:06:77:b4:19:17:c1:cf:26:53: d7:62:f0:1c:b3:02:28:82:52:e0:cc:af:78:7e:8a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c1:43:36:a7:31:6e:bf:33:78:28:da:13:cb:dd:67:2a: 96:89:29:40:6f:3c:25:98:e5:7c:1c:67:26:f4:b3:5e: fd:9e:d7:fd:a8:81:37:67:80:65:54:bd:fd:a0:c8:e6: 27:72:28:d3:36:3b:0e:51:dc:6d:55:78:84:b6:98:0d: 46:0d:bf:b1:d3:f0:9a:3d:77:fb:e7:7a:ae:eb:84:ee: a0:0c:0c:2e:ce:8d:69:f9:ef:e8:57:f3:19:09:f9:f4: 0e:ed:e0:d1:fd:8b:50:e3:8a:df:fc:ac:84:df:c2:56: db:b5:1b:1f:87:0f:9b:52:f0:e2:1f:af:54:b2:aa:e9 Fingerprint (MD5): 39:C8:4D:B3:9B:17:9E:31:34:C1:02:85:E7:E9:A1:48 Fingerprint (SHA1): 8C:F5:6D:E0:22:76:FC:51:74:5F:97:35:16:5B:2F:01:F5:DC:0F:A5 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5426: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174982 (0x13710906) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:50:32 2012 Not After : Sun Mar 26 21:50:32 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:4e:82:a2:e5:de:4c:da:41:ee:00:fe:0d:25:38:6b: 39:e3:3f:7a:45:b6:9e:08:08:79:d4:77:60:50:01:ae: 79:7e:83:6a:a2:30:c1:f9:7f:3b:0e:84:4a:65:67:97: b7:0a:a6:2f:b4:85:36:5e:7a:7c:04:88:29:95:b7:33: 81:e2:24:21:42:06:da:e8:ac:34:e7:fe:1a:c6:36:98: 30:43:d5:22:ad:79:93:4a:a2:3a:45:9a:06:cf:b3:c8: 65:5e:90:24:fc:37:90:06:77:b4:19:17:c1:cf:26:53: d7:62:f0:1c:b3:02:28:82:52:e0:cc:af:78:7e:8a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c1:43:36:a7:31:6e:bf:33:78:28:da:13:cb:dd:67:2a: 96:89:29:40:6f:3c:25:98:e5:7c:1c:67:26:f4:b3:5e: fd:9e:d7:fd:a8:81:37:67:80:65:54:bd:fd:a0:c8:e6: 27:72:28:d3:36:3b:0e:51:dc:6d:55:78:84:b6:98:0d: 46:0d:bf:b1:d3:f0:9a:3d:77:fb:e7:7a:ae:eb:84:ee: a0:0c:0c:2e:ce:8d:69:f9:ef:e8:57:f3:19:09:f9:f4: 0e:ed:e0:d1:fd:8b:50:e3:8a:df:fc:ac:84:df:c2:56: db:b5:1b:1f:87:0f:9b:52:f0:e2:1f:af:54:b2:aa:e9 Fingerprint (MD5): 39:C8:4D:B3:9B:17:9E:31:34:C1:02:85:E7:E9:A1:48 Fingerprint (SHA1): 8C:F5:6D:E0:22:76:FC:51:74:5F:97:35:16:5B:2F:01:F5:DC:0F:A5 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5427: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326174982 (0x13710906) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Mar 26 21:50:32 2012 Not After : Sun Mar 26 21:50:32 2062 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:4e:82:a2:e5:de:4c:da:41:ee:00:fe:0d:25:38:6b: 39:e3:3f:7a:45:b6:9e:08:08:79:d4:77:60:50:01:ae: 79:7e:83:6a:a2:30:c1:f9:7f:3b:0e:84:4a:65:67:97: b7:0a:a6:2f:b4:85:36:5e:7a:7c:04:88:29:95:b7:33: 81:e2:24:21:42:06:da:e8:ac:34:e7:fe:1a:c6:36:98: 30:43:d5:22:ad:79:93:4a:a2:3a:45:9a:06:cf:b3:c8: 65:5e:90:24:fc:37:90:06:77:b4:19:17:c1:cf:26:53: d7:62:f0:1c:b3:02:28:82:52:e0:cc:af:78:7e:8a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c1:43:36:a7:31:6e:bf:33:78:28:da:13:cb:dd:67:2a: 96:89:29:40:6f:3c:25:98:e5:7c:1c:67:26:f4:b3:5e: fd:9e:d7:fd:a8:81:37:67:80:65:54:bd:fd:a0:c8:e6: 27:72:28:d3:36:3b:0e:51:dc:6d:55:78:84:b6:98:0d: 46:0d:bf:b1:d3:f0:9a:3d:77:fb:e7:7a:ae:eb:84:ee: a0:0c:0c:2e:ce:8d:69:f9:ef:e8:57:f3:19:09:f9:f4: 0e:ed:e0:d1:fd:8b:50:e3:8a:df:fc:ac:84:df:c2:56: db:b5:1b:1f:87:0f:9b:52:f0:e2:1f:af:54:b2:aa:e9 Fingerprint (MD5): 39:C8:4D:B3:9B:17:9E:31:34:C1:02:85:E7:E9:A1:48 Fingerprint (SHA1): 8C:F5:6D:E0:22:76:FC:51:74:5F:97:35:16:5B:2F:01:F5:DC:0F:A5 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5428: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5429: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5430: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175012 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5431: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5432: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #5433: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5434: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 326175013 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5435: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der chains.sh: #5436: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #5437: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5438: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 326175014 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5439: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der chains.sh: #5440: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #5441: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5442: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 326175015 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5443: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der chains.sh: #5444: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #5445: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5446: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 326175016 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5447: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der chains.sh: #5448: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #5449: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5450: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 326175017 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5451: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der chains.sh: #5452: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #5453: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5454: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 326175018 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5455: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der chains.sh: #5456: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5457: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175012 (0x13710924) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:51:09 2012 Not After : Sun Mar 26 21:51:09 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e2:e7:24:6b:bd:64:2e:4d:a4:f0:6c:d3:2c:d2:82: f6:e2:78:5c:2c:2e:9e:1f:e2:e3:06:71:ac:97:45:b5: a2:ee:9b:87:bb:53:6d:7c:cb:6d:99:f9:80:ac:65:66: ea:c2:60:68:ae:36:d2:b4:1e:f4:5c:1f:5a:51:b3:1f: e7:3f:b0:eb:7b:e1:65:b0:2b:c1:b5:05:02:22:78:3e: 43:cb:af:b3:a2:61:7e:94:ea:c5:9d:0f:f9:f0:81:c2: 27:c6:b2:04:62:03:7a:ce:b8:9a:14:68:f7:b1:4d:17: 1b:b3:65:7c:fc:52:96:91:3a:72:a9:1e:bc:dc:d8:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b8:5f:17:18:8f:ae:fe:ac:76:9b:25:98:0a:8e:7e:44: a1:35:08:fc:9e:aa:7b:13:bd:96:32:fa:74:2c:a9:29: 91:e4:79:5d:dd:2d:c4:7f:58:a9:90:39:92:65:93:19: b0:97:09:56:81:ed:71:14:cf:91:a4:58:38:ba:8b:fa: 5e:0e:14:c7:5b:e4:e4:37:a0:a5:a0:d6:d4:91:4f:cc: 8f:7f:9c:4f:04:8c:c3:06:0c:97:49:0a:6b:c0:9b:06: 06:35:90:d0:40:d6:15:0a:02:bd:c4:c3:48:de:2e:57: 25:73:65:71:14:c8:f7:e9:9d:ac:fb:a2:53:c2:9e:2d Fingerprint (MD5): 2D:5D:2D:EA:F3:16:2F:F3:CE:31:60:E5:E4:77:F4:43 Fingerprint (SHA1): 2A:73:97:F3:CE:26:1D:D6:02:99:98:82:DF:6E:94:00:8E:3A:E6:1D Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #5458: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5459: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5460: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5461: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175012 (0x13710924) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:51:09 2012 Not After : Sun Mar 26 21:51:09 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:e2:e7:24:6b:bd:64:2e:4d:a4:f0:6c:d3:2c:d2:82: f6:e2:78:5c:2c:2e:9e:1f:e2:e3:06:71:ac:97:45:b5: a2:ee:9b:87:bb:53:6d:7c:cb:6d:99:f9:80:ac:65:66: ea:c2:60:68:ae:36:d2:b4:1e:f4:5c:1f:5a:51:b3:1f: e7:3f:b0:eb:7b:e1:65:b0:2b:c1:b5:05:02:22:78:3e: 43:cb:af:b3:a2:61:7e:94:ea:c5:9d:0f:f9:f0:81:c2: 27:c6:b2:04:62:03:7a:ce:b8:9a:14:68:f7:b1:4d:17: 1b:b3:65:7c:fc:52:96:91:3a:72:a9:1e:bc:dc:d8:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b8:5f:17:18:8f:ae:fe:ac:76:9b:25:98:0a:8e:7e:44: a1:35:08:fc:9e:aa:7b:13:bd:96:32:fa:74:2c:a9:29: 91:e4:79:5d:dd:2d:c4:7f:58:a9:90:39:92:65:93:19: b0:97:09:56:81:ed:71:14:cf:91:a4:58:38:ba:8b:fa: 5e:0e:14:c7:5b:e4:e4:37:a0:a5:a0:d6:d4:91:4f:cc: 8f:7f:9c:4f:04:8c:c3:06:0c:97:49:0a:6b:c0:9b:06: 06:35:90:d0:40:d6:15:0a:02:bd:c4:c3:48:de:2e:57: 25:73:65:71:14:c8:f7:e9:9d:ac:fb:a2:53:c2:9e:2d Fingerprint (MD5): 2D:5D:2D:EA:F3:16:2F:F3:CE:31:60:E5:E4:77:F4:43 Fingerprint (SHA1): 2A:73:97:F3:CE:26:1D:D6:02:99:98:82:DF:6E:94:00:8E:3A:E6:1D Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #5462: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5463: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5464: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5465: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175019 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5466: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5467: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5468: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5469: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326175020 --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5470: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5471: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5472: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5473: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326175021 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5474: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5475: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5476: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5477: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326175022 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5478: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #5479: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5480: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5481: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5482: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5483: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175019 (0x1371092b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:51:18 2012 Not After : Sun Mar 26 21:51:18 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:d2:1f:bb:27:ca:96:a3:b9:cf:44:24:39:95:90:21: f3:c9:28:9c:a4:54:01:f5:98:85:5a:5b:fc:77:b6:93: 4a:89:7d:8f:bf:e0:67:5e:8c:4a:bb:7f:43:98:95:4a: 7b:30:60:33:62:58:fb:3e:13:73:6b:a0:74:c7:58:49: 73:ef:d8:89:45:be:0a:c2:a1:4f:19:32:88:57:e3:ec: 05:e5:25:10:bb:ba:4b:24:66:2d:da:ac:1d:4c:c8:9b: 16:e5:e0:1a:d9:5c:76:6b:e6:04:f7:7d:01:d6:15:bb: 2f:fd:51:b7:5e:69:4f:80:b0:1e:e2:d3:4c:fc:27:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a4:8f:94:ab:48:bf:f8:25:64:24:d2:0a:44:70:f6:c1: 51:e8:1b:92:88:66:48:51:9d:eb:69:3b:7e:17:c1:62: 7c:85:03:ad:e4:11:55:40:25:62:6a:d2:66:70:b4:2e: 00:86:1b:d5:ec:cf:19:06:9c:7e:85:32:1d:9b:6b:25: ba:1f:43:17:5b:52:e7:03:0b:66:25:1b:f5:33:27:eb: c8:f9:16:02:c5:88:a5:76:e2:44:e0:47:02:42:76:ee: 3d:60:b5:f0:5f:84:1e:b3:d9:29:be:74:12:be:cf:b3: a0:4a:e4:c2:61:46:fe:16:3c:23:26:6b:32:5a:39:da Fingerprint (MD5): 7C:51:39:DE:08:FE:34:E5:D7:C0:3E:46:AF:A4:43:B8 Fingerprint (SHA1): F0:D8:E5:E1:91:68:51:C5:E7:0E:51:BC:1F:02:46:2D:FC:23:6E:71 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5484: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5485: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5486: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175020 (0x1371092c) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:51:19 2012 Not After : Sun Mar 26 21:51:19 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:54:4d:36:11:66:28:bb:37:ba:65:bd:d3:0a:97:87: ae:b5:f4:27:b4:53:78:47:b0:8f:d7:31:f5:0d:e1:e3: 00:7c:f6:95:2b:36:10:24:2b:87:7e:69:82:31:aa:0c: 16:a0:f7:53:54:43:ec:43:a0:46:4d:a4:5e:8f:88:bb: 1d:8e:17:ec:af:f0:7d:71:ea:61:21:8d:0a:01:8b:25: 15:5b:e8:ba:de:4f:d2:9a:bf:c9:2f:22:a6:2c:39:45: 34:f4:c8:f9:91:e7:ba:f6:16:74:16:2c:62:be:1f:85: 2c:d1:d8:7e:9b:53:e1:0c:3b:ad:15:01:ae:de:0a:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 4e:80:25:9e:82:b1:cb:93:96:fd:03:ed:b7:0f:d9:03: 04:83:fa:92:6e:d8:2e:0e:e4:77:3e:26:39:60:e3:48: b3:15:0d:b5:cf:6f:cf:79:15:48:14:87:ba:c5:87:4d: 4a:42:b7:69:de:62:3b:99:da:08:e0:75:aa:95:89:35: 57:76:7e:23:d2:95:af:4b:94:02:0e:40:a7:49:9a:aa: f0:67:5c:6b:7c:34:e1:b5:e4:46:6c:6e:64:df:b0:05: 5f:a8:0b:9f:23:07:41:3c:ae:f9:46:08:b9:6f:c7:3d: 43:88:86:7c:4c:dc:b9:24:34:25:b3:66:41:bc:d9:8f Fingerprint (MD5): 18:72:84:18:FF:E0:EA:23:75:42:44:9F:20:50:F3:D9 Fingerprint (SHA1): 15:BB:4A:2F:67:0A:F2:AD:A6:4E:48:A1:FE:D4:77:F9:39:B8:67:8A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5487: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5488: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175021 (0x1371092d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:51:21 2012 Not After : Sun Mar 26 21:51:21 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:5a:f7:64:1a:f0:6f:ff:33:c0:50:41:65:47:09:3f: a2:a6:82:b0:b8:e4:a2:88:8e:5b:cc:d9:25:be:35:6f: 5f:59:1c:8c:ac:f9:ee:ae:79:a7:9f:79:43:b5:c3:3c: 13:b4:79:b7:f2:53:c1:33:d2:65:56:de:27:28:e4:a6: da:63:f3:31:d5:1a:98:4b:45:d2:90:3a:9c:3a:7c:82: 4a:bf:5b:b4:ad:25:62:2d:2f:f9:3e:b8:1b:e4:77:25: a0:d9:e4:75:d4:87:9e:1f:3b:38:ce:46:c4:23:a6:63: 48:a2:88:28:e7:3c:08:6f:cc:14:9c:1b:0c:92:2b:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 89:67:73:3a:4f:c2:30:1f:63:44:27:1b:a9:2f:a9:35: ca:0f:78:67:b2:7e:1c:41:0e:12:61:f8:4f:9b:72:13: b8:fd:f8:cc:07:dc:1e:5f:3a:5a:06:46:a0:ff:86:b8: 20:96:25:61:47:cd:92:3d:e2:91:df:c8:f6:82:ab:da: 4f:ce:73:98:d7:62:ba:04:53:26:be:62:cf:30:bc:14: 00:46:c0:81:b1:c5:c0:eb:11:fa:87:c9:0a:c3:60:87: a8:88:47:71:c4:e0:f8:e5:07:0d:e4:13:bd:2f:b1:87: 84:74:d6:f3:c8:d5:92:57:da:6c:f4:14:60:d1:58:f7 Fingerprint (MD5): 8B:80:EA:1D:6B:18:CE:1B:36:DD:CF:62:A3:37:F2:44 Fingerprint (SHA1): 6F:8C:6A:52:16:42:E8:81:4F:AE:5B:3C:38:BB:67:DE:41:2F:8B:21 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #5489: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5490: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175023 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5491: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5492: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5493: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5494: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326175024 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5495: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5496: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5497: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5498: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326175025 --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5499: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5500: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #5501: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5502: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 326175026 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5503: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der chains.sh: #5504: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5505: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5506: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 326175027 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5507: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der chains.sh: #5508: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5509: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5510: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5511: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5512: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #5513: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175023 (0x1371092f) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:51:25 2012 Not After : Sun Mar 26 21:51:25 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:e4:a8:79:2e:4a:64:cf:04:25:0d:0b:92:c9:07:83: 53:4f:75:5b:ac:64:0b:6f:f8:06:67:e1:59:24:3a:27: 01:c5:b3:9a:ed:66:94:ef:46:fd:71:78:70:d3:b2:8f: 6c:a6:64:42:9b:f4:c2:ee:42:0d:24:8b:3f:98:fa:0c: 73:59:52:83:f2:f9:1d:85:59:25:1d:69:ee:71:19:f4: 47:46:5b:88:22:11:8d:09:6b:4e:de:ed:f4:c4:75:c9: a5:32:9c:96:a2:21:97:01:f2:87:58:91:ea:97:e5:9d: ed:84:e1:f9:85:6e:ff:71:89:12:84:fe:67:e1:29:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 10:83:10:09:f5:19:fd:79:a5:44:75:af:ae:cd:5a:ce: 74:0e:09:b6:54:2a:29:2f:c0:ee:db:85:4a:9b:9a:12: da:99:93:3a:6c:5e:d3:13:16:a1:67:05:96:c1:45:75: 70:74:9d:7d:6d:2a:49:c8:c8:f0:79:41:64:55:82:07: a7:e2:66:8c:83:7f:6c:3b:d3:be:63:0b:40:5c:b1:ab: 31:f2:37:f5:20:ce:b1:68:81:55:df:61:1c:d1:c9:04: 4f:20:9b:8f:b1:16:57:a0:51:00:87:62:ac:84:2e:46: d1:89:7d:c3:b8:44:cf:95:a7:f8:bc:af:d3:28:3b:d1 Fingerprint (MD5): AB:7E:39:0D:6E:25:08:33:02:C3:EC:DC:3A:D7:02:CB Fingerprint (SHA1): 2F:D2:DA:6F:94:D3:59:B2:87:62:CA:52:69:2A:92:91:1C:9E:F6:F3 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5514: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5515: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175024 (0x13710930) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:51:26 2012 Not After : Sun Mar 26 21:51:26 2017 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:6b:dd:38:ca:99:3a:45:6e:2f:d7:b5:e4:7f:e2:44: 74:42:81:71:4e:06:af:50:25:96:7d:58:da:c1:ec:c4: ee:49:56:d5:6e:04:2d:d9:c2:7a:dd:75:1c:c7:fa:88: 69:42:ed:36:02:65:d1:04:c9:6f:6c:d4:62:ef:65:2f: 31:07:f5:50:3d:d6:8b:c4:95:13:7c:90:13:88:b2:79: 83:11:46:c7:12:18:e9:ba:cb:fd:d5:86:01:61:01:3d: 62:80:31:99:4b:80:17:16:dc:e9:d5:76:20:97:09:2e: a5:0f:e3:13:12:26:e2:91:48:b6:4a:ed:6b:a6:5b:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:38:00:f2:bf:fc:af:e7:19:82:7c:04:66:79:f4:cb: 22:80:3f:da:5c:dc:67:a7:47:97:30:44:56:22:20:b4: e2:6c:94:1b:1c:f2:97:89:79:13:ab:c6:8f:e9:d4:b3: 9d:24:a6:5e:df:d2:e8:b1:7c:b9:b5:99:36:39:ca:08: 00:ae:98:69:5d:8c:cf:4a:27:21:b5:19:cc:5f:02:54: eb:c5:97:da:ad:40:97:bc:d9:e0:6e:5d:6f:2a:47:80: 49:6a:f9:31:47:f0:0d:64:13:a8:b8:42:47:2d:96:1a: 33:0d:91:04:c2:d4:86:ca:29:ed:dd:60:49:30:01:ba Fingerprint (MD5): DA:D7:A8:39:32:CF:34:F2:61:54:E4:4A:97:0A:61:19 Fingerprint (SHA1): BA:14:44:3A:68:14:9B:1E:1D:77:B5:99:1D:B6:AE:D4:1B:82:3D:4B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5516: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5517: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5518: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175025 (0x13710931) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Mar 26 21:51:27 2012 Not After : Sun Mar 26 21:51:27 2017 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:8f:6a:53:e1:aa:e5:d2:b6:90:b1:bb:be:9d:0f:1c: ed:af:4a:ac:00:61:d9:7d:0f:7b:17:bc:1a:b3:ba:57: ba:00:a6:fb:53:67:a2:7c:2a:b2:ef:e4:7b:d7:3d:de: e4:98:5f:b0:02:10:18:ec:2c:aa:b3:b6:08:5a:66:cb: da:c3:e5:06:6b:d2:da:56:57:a4:e5:27:c4:7b:d1:bf: e9:54:92:a2:0b:2e:b0:ef:12:c3:5d:a6:d6:b5:e0:b1: 52:6a:ae:c9:db:47:9e:73:2e:f9:4e:9e:09:54:a3:58: 84:c0:15:d8:fd:8c:30:6f:0b:77:b0:e3:bd:87:d7:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 29:17:5f:82:ff:d1:5d:ed:c1:92:f1:b6:19:6b:31:2f: 90:e0:20:f0:5e:2f:ce:17:fd:e5:cb:1e:e7:63:3a:5c: 0d:27:b0:34:02:18:23:29:cd:a1:43:b4:af:c6:53:35: 06:0b:73:f9:60:b7:c1:e3:a8:73:45:f4:58:8e:b8:5d: 49:67:bc:f1:a3:3f:fc:3e:48:00:1e:e2:ad:99:0a:eb: 28:4c:b5:99:9b:83:41:2f:ab:0f:e0:11:cb:db:8f:ab: c7:3b:93:e4:86:a3:96:ca:51:b4:93:0e:ba:b5:0e:60: 18:a7:e2:92:bd:2c:ff:58:d5:ee:7c:70:8a:71:b7:a9 Fingerprint (MD5): 89:E1:D1:14:E8:9D:B3:C2:E3:9C:E5:FE:55:52:6A:4F Fingerprint (SHA1): EA:9D:D6:59:BF:1F:67:3E:8D:95:96:3F:F7:A2:14:A9:F4:A1:6A:E0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #5519: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5520: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175028 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5521: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5522: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5523: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5524: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326175029 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5525: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5526: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5527: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5528: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 326175030 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-30287-CA1Root-326174938.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5529: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5530: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5531: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5532: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 326175031 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5533: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #5534: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #5535: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5536: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175032 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5537: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5538: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5539: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175033 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5540: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5541: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5542: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5543: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326175034 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5544: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #5545: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326175035 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5546: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #5547: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #5548: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5549: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5550: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326175036 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-30287-Bridge-326174939.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5551: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #5552: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5553: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5554: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326175037 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5555: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #5556: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5557: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5558: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175038 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5559: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5560: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5561: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175039 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5562: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5563: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5564: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5565: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 326175040 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5566: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #5567: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 326175041 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5568: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #5569: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #5570: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5571: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5572: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326175042 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-30287-Bridge-326174940.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5573: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #5574: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5575: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5576: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326175043 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5577: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #5578: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5579: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5580: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 326175044 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-30287-BridgeNavy-326174941.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5581: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #5582: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5583: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5584: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326175045 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5585: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #5586: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5587: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5588: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175046 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5589: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5590: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5591: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175047 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5592: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5593: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #5594: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5595: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 326175048 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5596: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der chains.sh: #5597: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #5598: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5599: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 326175049 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5600: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der chains.sh: #5601: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5602: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5603: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 326175050 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5604: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der chains.sh: #5605: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 326175051 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5606: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der chains.sh: #5607: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #5608: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5609: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5610: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 326175052 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5611: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #5612: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5613: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5614: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 326175053 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5615: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #5616: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5617: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5618: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326175054 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5619: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #5620: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5621: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5622: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326175055 --extCP < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5623: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #5624: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5625: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175046 (0x13710946) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Mar 26 21:51:51 2012 Not After : Sun Mar 26 21:51:51 2062 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:19:07:a2:c4:0a:b9:72:67:4f:bf:60:fd:49:ca:b3: ea:e0:f1:97:f8:9b:e1:19:57:28:24:63:be:0d:30:d8: 64:1c:05:5d:46:ca:7b:9a:ce:f4:1b:c7:20:85:39:b2: 34:2c:33:c2:b7:e3:9c:cb:93:7f:85:c0:89:0d:59:65: fb:ba:a4:f2:c8:9b:56:c2:c8:2c:2f:6b:c9:93:41:51: a2:18:2a:b8:0d:04:82:a5:07:ad:8c:11:d8:99:c1:01: 20:3b:4c:fe:f6:04:3e:8f:da:65:0c:d2:b8:6f:f4:3c: 70:42:6d:43:f5:4c:c1:f3:c6:9a:d6:5d:25:02:51:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1e:83:4d:45:4c:f3:40:d2:c9:f6:5c:e8:e1:bd:6a:c8: 97:38:fe:c8:e8:14:ca:a6:8e:7e:3f:f0:71:73:fe:34: 5d:28:77:87:18:56:39:5e:c7:5b:8d:a2:26:ba:32:a4: 72:e1:40:19:bf:11:df:00:93:10:0f:d7:7f:ab:ff:39: fd:d6:80:e8:fe:ff:b5:bc:19:49:d6:35:17:17:4f:c8: aa:46:dc:76:ff:f4:10:6c:00:a2:81:1e:02:a9:ac:31: 50:51:44:af:2f:25:25:aa:30:13:4f:12:35:51:52:d7: fa:c9:59:43:c8:86:53:0c:79:e4:9c:b2:dc:59:93:06 Fingerprint (MD5): 55:67:58:B1:22:0E:E8:38:87:20:58:C7:FB:64:3A:81 Fingerprint (SHA1): D2:B2:C7:95:B4:AE:33:F7:D9:3E:77:56:4D:20:C4:F9:13:06:56:32 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #5626: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5627: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5628: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5629: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5630: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5631: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5632: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5633: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5634: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175047 (0x13710947) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Mar 26 21:51:52 2012 Not After : Sun Mar 26 21:51:52 2062 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:97:f0:d4:e0:97:db:fe:4e:f8:29:0c:d9:ce:48:37: 49:1d:7e:b8:0a:72:8a:fc:b9:a6:75:19:fc:96:a7:be: ac:22:2b:bc:0c:e9:93:88:86:69:8e:3b:4b:08:a9:00: e1:30:d7:70:92:62:08:c7:ff:96:c7:14:47:49:a9:02: 0c:d1:a0:3a:bf:4b:90:d3:7e:44:7c:36:87:50:3d:17: 65:54:db:2a:64:13:47:38:3c:22:90:a1:01:a6:f7:84: ee:02:2b:58:3c:72:c7:9d:ca:8c:a7:90:b8:74:f3:77: f7:53:d1:d0:6d:e7:b9:d7:a9:6d:40:57:98:21:34:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c6:0a:16:1d:ec:e7:b8:84:b1:24:de:67:bc:bd:7b:4c: 83:64:12:ac:aa:17:e9:0c:1c:09:29:fe:6d:5f:32:54: 75:06:ca:f9:ec:6b:2a:47:fc:e0:ab:f8:7f:65:6e:47: a6:56:30:b9:dd:0b:a1:d6:0b:9c:79:eb:2c:30:f5:ae: 47:4f:ae:fa:1e:23:1a:46:57:a5:3d:92:f2:25:71:70: 2f:1b:25:d7:b6:ae:bb:90:b1:d0:a7:f2:1f:2c:df:63: 5d:66:4b:b7:b9:cf:1e:39:5d:a2:14:8e:a7:87:d9:d0: 83:15:e0:4f:d2:4e:f7:45:c6:9c:7e:c7:41:d1:71:73 Fingerprint (MD5): 0B:DC:8E:B5:72:A6:52:93:25:9B:91:75:6D:FF:3F:02 Fingerprint (SHA1): 9B:21:96:8A:81:EF:58:50:CE:38:B5:B0:8A:88:33:9C:5C:BB:6F:F3 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #5635: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5636: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5637: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5638: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5639: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5640: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5641: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #5642: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #5643: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #5644: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #5645: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #5646: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #5647: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #5648: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #5649: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #5650: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.113733.1.7.23.6 /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig n, Inc.",C=US" Validity: Not Before: Wed Nov 08 00:00:00 2006 Not After : Sun Nov 07 23:59:59 2021 Subject: "CN=VeriSign Class 3 Public Primary Certification Authority - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve riSign Trust Network,O="VeriSign, Inc.",C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc: 7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64: 85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42: b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec: ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3: 62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b: 9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f: e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db: 7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af: 1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a: b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7: ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74: 24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4: 8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95: ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f: 73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: CRL Distribution Points Distribution point: URI: "http://crl.verisign.com/pca3.crl" Name: Certificate Key Usage Critical: True Usages: Certificate Signing CRL Signing Name: OID.1.3.6.1.5.5.7.1.12 Data: Sequence { [1]: { [0]: { Sequence { Sequence { Sequence { "image/gif" Sequence { Sequence { Sequence { SHA-1 } 8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf: 80:6a:d4:48:18:2c:7b:19:2e } } Sequence { "http://logo.verisign.com/vslogo.gif" } } } } } } } Name: Certificate Policies Data: Policy Name: Certificate Policies AnyPolicy Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Qualifier Data: "https://www.verisign.com/cps" Name: Certificate Subject Key ID Data: 7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02: af:33:31:33 Name: Certificate Authority Key Identifier Issuer: Directory Name: "OU=Class 3 Public Primary Certification Auth ority,O="VeriSign, Inc.",C=US" Serial Number: 70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a: f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31: 47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c: d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0: ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d: 5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a: 84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1: d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6 Fingerprint (MD5): C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C Fingerprint (SHA1): 87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C= US,serialNumber=3014267,businessCategory=Private Organization,incorporati onState=Delaware,incorporationCountry=US" Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network ,O="VeriSign, Inc.",C=US" Returned value is 0, expected result is pass chains.sh: #5651: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.3/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #5652: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5653: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175056 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5654: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5655: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5656: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5657: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 326175057 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5658: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5659: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5660: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5661: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 326175058 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5662: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #5663: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5664: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5665: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 326175059 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5666: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der chains.sh: #5667: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5668: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5669: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 326175060 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5670: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #5671: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #5672: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5673: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 326175061 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5674: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der chains.sh: #5675: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #5676: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5677: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 326175062 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5678: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der chains.sh: #5679: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #5680: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5681: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 326175063 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5682: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der chains.sh: #5683: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #5684: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5685: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 326175064 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5686: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der chains.sh: #5687: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5688: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175056 (0x13710950) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:52:05 2012 Not After : Sun Mar 26 21:52:05 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 86:77:ce:a7:39:0b:8a:2b:6b:77:53:45:68:a6:72:7b: 1a:23:ae:48:90:a1:6e:49:91:0d:f2:b6:f6:21:31:67: 50:10:46:46:26:dd:c8:ab:82:a4:39:a3:4a:0e:41:0f: a8:a4:d9:d6:be:08:1a:a9:29:a3:5a:2b:a8:d6:f0:c8: 9d:a0:cc:ab:db:90:07:22:62:5d:2a:17:4e:e4:99:63: 78:1a:4f:07:cb:78:df:58:b7:3e:57:57:45:a6:38:4e: 99:6b:99:1f:d7:bb:cc:f8:b7:12:c4:70:73:6b:d5:18: 67:93:25:bc:3c:8d:aa:80:48:0c:1f:b3:e7:3e:3c:e9 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2c:02:14:46:33:4a:8c:29:c7:b0:70:99:94:2a:b9: cc:49:12:8c:a4:2b:9f:d0:02:14:5d:03:19:a5:b1:d2: 7f:9b:ed:85:89:69:5a:b6:55:1a:78:0a:13:90 Fingerprint (MD5): 8A:FA:8E:07:81:42:7C:46:CA:E5:9A:F7:52:82:76:28 Fingerprint (SHA1): EA:70:48:DD:1D:BF:09:BD:18:BF:57:C6:95:5E:70:91:6C:27:68:C6 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5689: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175056 (0x13710950) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:52:05 2012 Not After : Sun Mar 26 21:52:05 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 86:77:ce:a7:39:0b:8a:2b:6b:77:53:45:68:a6:72:7b: 1a:23:ae:48:90:a1:6e:49:91:0d:f2:b6:f6:21:31:67: 50:10:46:46:26:dd:c8:ab:82:a4:39:a3:4a:0e:41:0f: a8:a4:d9:d6:be:08:1a:a9:29:a3:5a:2b:a8:d6:f0:c8: 9d:a0:cc:ab:db:90:07:22:62:5d:2a:17:4e:e4:99:63: 78:1a:4f:07:cb:78:df:58:b7:3e:57:57:45:a6:38:4e: 99:6b:99:1f:d7:bb:cc:f8:b7:12:c4:70:73:6b:d5:18: 67:93:25:bc:3c:8d:aa:80:48:0c:1f:b3:e7:3e:3c:e9 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2c:02:14:46:33:4a:8c:29:c7:b0:70:99:94:2a:b9: cc:49:12:8c:a4:2b:9f:d0:02:14:5d:03:19:a5:b1:d2: 7f:9b:ed:85:89:69:5a:b6:55:1a:78:0a:13:90 Fingerprint (MD5): 8A:FA:8E:07:81:42:7C:46:CA:E5:9A:F7:52:82:76:28 Fingerprint (SHA1): EA:70:48:DD:1D:BF:09:BD:18:BF:57:C6:95:5E:70:91:6C:27:68:C6 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5690: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175056 (0x13710950) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:52:05 2012 Not After : Sun Mar 26 21:52:05 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 86:77:ce:a7:39:0b:8a:2b:6b:77:53:45:68:a6:72:7b: 1a:23:ae:48:90:a1:6e:49:91:0d:f2:b6:f6:21:31:67: 50:10:46:46:26:dd:c8:ab:82:a4:39:a3:4a:0e:41:0f: a8:a4:d9:d6:be:08:1a:a9:29:a3:5a:2b:a8:d6:f0:c8: 9d:a0:cc:ab:db:90:07:22:62:5d:2a:17:4e:e4:99:63: 78:1a:4f:07:cb:78:df:58:b7:3e:57:57:45:a6:38:4e: 99:6b:99:1f:d7:bb:cc:f8:b7:12:c4:70:73:6b:d5:18: 67:93:25:bc:3c:8d:aa:80:48:0c:1f:b3:e7:3e:3c:e9 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2c:02:14:46:33:4a:8c:29:c7:b0:70:99:94:2a:b9: cc:49:12:8c:a4:2b:9f:d0:02:14:5d:03:19:a5:b1:d2: 7f:9b:ed:85:89:69:5a:b6:55:1a:78:0a:13:90 Fingerprint (MD5): 8A:FA:8E:07:81:42:7C:46:CA:E5:9A:F7:52:82:76:28 Fingerprint (SHA1): EA:70:48:DD:1D:BF:09:BD:18:BF:57:C6:95:5E:70:91:6C:27:68:C6 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #5691: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 326175056 (0x13710950) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:52:05 2012 Not After : Sun Mar 26 21:52:05 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 86:77:ce:a7:39:0b:8a:2b:6b:77:53:45:68:a6:72:7b: 1a:23:ae:48:90:a1:6e:49:91:0d:f2:b6:f6:21:31:67: 50:10:46:46:26:dd:c8:ab:82:a4:39:a3:4a:0e:41:0f: a8:a4:d9:d6:be:08:1a:a9:29:a3:5a:2b:a8:d6:f0:c8: 9d:a0:cc:ab:db:90:07:22:62:5d:2a:17:4e:e4:99:63: 78:1a:4f:07:cb:78:df:58:b7:3e:57:57:45:a6:38:4e: 99:6b:99:1f:d7:bb:cc:f8:b7:12:c4:70:73:6b:d5:18: 67:93:25:bc:3c:8d:aa:80:48:0c:1f:b3:e7:3e:3c:e9 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2c:02:14:46:33:4a:8c:29:c7:b0:70:99:94:2a:b9: cc:49:12:8c:a4:2b:9f:d0:02:14:5d:03:19:a5:b1:d2: 7f:9b:ed:85:89:69:5a:b6:55:1a:78:0a:13:90 Fingerprint (MD5): 8A:FA:8E:07:81:42:7C:46:CA:E5:9A:F7:52:82:76:28 Fingerprint (SHA1): EA:70:48:DD:1D:BF:09:BD:18:BF:57:C6:95:5E:70:91:6C:27:68:C6 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #5692: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5693: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5694: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5695: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #5696: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5697: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5698: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #5699: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5700: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5701: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5702: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #5703: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #5704: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5705: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5706: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #5707: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #5708: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5709: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5710: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der chains.sh: #5711: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5712: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5713: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5714: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #5715: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #5716: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5717: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5718: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #5719: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20120326215222Z nextupdate=20130326215222Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 26 21:52:22 2012 Next Update: Tue Mar 26 21:52:22 2013 CRL Extensions: chains.sh: #5720: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326215222Z nextupdate=20130326215222Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:52:22 2012 Next Update: Tue Mar 26 21:52:22 2013 CRL Extensions: chains.sh: #5721: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326215223Z nextupdate=20130326215223Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:52:23 2012 Next Update: Tue Mar 26 21:52:23 2013 CRL Extensions: chains.sh: #5722: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20120326215223Z nextupdate=20130326215223Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 26 21:52:23 2012 Next Update: Tue Mar 26 21:52:23 2013 CRL Extensions: chains.sh: #5723: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326215224Z addcert 14 20120326215224Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:52:24 2012 Next Update: Tue Mar 26 21:52:23 2013 Entry (1): Serial Number: 14 (0xe) Revocation Date: Mon Mar 26 21:52:24 2012 CRL Extensions: chains.sh: #5724: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326215225Z addcert 15 20120326215225Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:52:25 2012 Next Update: Tue Mar 26 21:52:22 2013 Entry (1): Serial Number: 15 (0xf) Revocation Date: Mon Mar 26 21:52:25 2012 CRL Extensions: chains.sh: #5725: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5726: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5727: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #5728: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #5729: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #5730: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #5731: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #5732: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #5733: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #5734: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:52:15 2012 Not After : Sun Mar 26 21:52:15 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:db:70:e2:68:04:70:fc:c1:95:20:dc:66:a9:1f:f4: 40:a6:81:66:df:bd:02:02:8b:f6:08:b8:c0:54:5e:86: 97:e4:ae:05:e0:51:cd:85:2f:85:45:17:b0:0b:a7:75: de:05:e8:a4:81:19:2e:bb:7c:54:e8:b8:c7:fb:1d:d7: 6a:09:a4:45:59:94:9f:57:5c:92:26:d4:ec:a2:4a:a5: 78:14:be:aa:52:08:3b:26:db:fc:99:35:a5:9c:04:c3: b1:d0:ff:ef:5a:ba:ca:40:b4:00:3c:8d:13:5d:24:47: 57:ed:f4:2a:49:70:0e:36:36:a6:f5:de:6f:a6:0f:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 47:89:95:b8:cd:9a:09:00:ed:38:b0:bf:59:17:41:d1: d4:66:ed:0d:38:d4:3d:11:d5:3d:8f:68:6c:95:00:74: b7:97:19:77:07:bf:b7:7d:ab:c9:bf:69:7f:0c:ef:c2: c9:10:d1:6e:18:4a:e5:21:c2:1f:16:f0:e3:23:f2:c5: 01:de:d7:f2:61:e1:15:2d:88:48:e7:be:a1:33:58:23: 83:04:ca:1c:c4:11:e9:7b:65:16:10:eb:13:ec:1d:1d: 8f:34:86:ab:a2:c2:55:f0:08:76:de:b6:22:12:fc:8b: 24:bb:3f:6b:12:0f:ab:19:86:b7:44:9d:b4:1a:f9:c1 Fingerprint (MD5): 9A:56:3C:37:EF:E8:E9:FC:ED:07:A6:AC:4B:EE:B5:CB Fingerprint (SHA1): 57:17:8F:BC:2B:8C:78:F0:30:6C:9D:6C:88:72:E7:8E:9B:D8:85:84 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5735: Revocation: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5736: Revocation: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Mar 26 21:52:15 2012 Not After : Sun Mar 26 21:52:15 2062 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:db:70:e2:68:04:70:fc:c1:95:20:dc:66:a9:1f:f4: 40:a6:81:66:df:bd:02:02:8b:f6:08:b8:c0:54:5e:86: 97:e4:ae:05:e0:51:cd:85:2f:85:45:17:b0:0b:a7:75: de:05:e8:a4:81:19:2e:bb:7c:54:e8:b8:c7:fb:1d:d7: 6a:09:a4:45:59:94:9f:57:5c:92:26:d4:ec:a2:4a:a5: 78:14:be:aa:52:08:3b:26:db:fc:99:35:a5:9c:04:c3: b1:d0:ff:ef:5a:ba:ca:40:b4:00:3c:8d:13:5d:24:47: 57:ed:f4:2a:49:70:0e:36:36:a6:f5:de:6f:a6:0f:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 47:89:95:b8:cd:9a:09:00:ed:38:b0:bf:59:17:41:d1: d4:66:ed:0d:38:d4:3d:11:d5:3d:8f:68:6c:95:00:74: b7:97:19:77:07:bf:b7:7d:ab:c9:bf:69:7f:0c:ef:c2: c9:10:d1:6e:18:4a:e5:21:c2:1f:16:f0:e3:23:f2:c5: 01:de:d7:f2:61:e1:15:2d:88:48:e7:be:a1:33:58:23: 83:04:ca:1c:c4:11:e9:7b:65:16:10:eb:13:ec:1d:1d: 8f:34:86:ab:a2:c2:55:f0:08:76:de:b6:22:12:fc:8b: 24:bb:3f:6b:12:0f:ab:19:86:b7:44:9d:b4:1a:f9:c1 Fingerprint (MD5): 9A:56:3C:37:EF:E8:E9:FC:ED:07:A6:AC:4B:EE:B5:CB Fingerprint (SHA1): 57:17:8F:BC:2B:8C:78:F0:30:6C:9D:6C:88:72:E7:8E:9B:D8:85:84 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5737: Revocation: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5738: Revocation: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED ./chains.sh: line 806: ping: command not found OCSP server not accessible, skipping OCSP tests chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5739: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 326175065 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5740: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5741: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #5742: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5743: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 326175066 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5744: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #5745: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5746: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 /localhost-30287-CA0-326174955.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5747: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-30287-CA0Root-326174942.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5748: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #5749: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #5750: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-30287-CA0-326174955.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5751: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 326175067 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5752: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #5753: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5754: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 /localhost-30287-CA0-326174955.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5755: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-30287-CA0Root-326174943.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5756: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #5757: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #5758: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5759: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 326175068 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5760: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #5761: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5762: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-30287-CA0-326174955.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5763: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-30287-CA0Root-326174944.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5764: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der chains.sh: #5765: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5766: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-30287-CA0-326174955.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5767: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.13.3/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-30287-CA0Root-326174945.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5768: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der chains.sh: #5769: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20120326215238Z nextupdate=20130326215238Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Mar 26 21:52:38 2012 Next Update: Tue Mar 26 21:52:38 2013 CRL Extensions: chains.sh: #5770: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326215238Z nextupdate=20130326215238Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:52:38 2012 Next Update: Tue Mar 26 21:52:38 2013 CRL Extensions: chains.sh: #5771: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20120326215238Z nextupdate=20130326215238Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Mar 26 21:52:38 2012 Next Update: Tue Mar 26 21:52:38 2013 CRL Extensions: chains.sh: #5772: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20120326215238Z nextupdate=20130326215238Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Mar 26 21:52:38 2012 Next Update: Tue Mar 26 21:52:38 2013 CRL Extensions: chains.sh: #5773: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326215239Z addcert 20 20120326215239Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:52:39 2012 Next Update: Tue Mar 26 21:52:38 2013 Entry (1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 26 21:52:39 2012 CRL Extensions: chains.sh: #5774: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20120326215240Z addcert 40 20120326215240Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Mar 26 21:52:40 2012 Next Update: Tue Mar 26 21:52:38 2013 Entry (1): Serial Number: 20 (0x14) Revocation Date: Mon Mar 26 21:52:39 2012 Entry (2): Serial Number: 40 (0x28) Revocation Date: Mon Mar 26 21:52:40 2012 CRL Extensions: chains.sh: #5775: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5776: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5777: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #5778: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined TIMESTAMP chains END: Mon Mar 26 17:52:41 EDT 2012 SUMMARY: ======== NSS variables: -------------- HOST=localhost DOMSUF=localdomain BUILD_OPT=1 USE_64= NSS_CYCLES="" NSS_TESTS="" NSS_SSL_TESTS="crl bypass_normal normal_bypass fips_normal normal_fips iopr" NSS_SSL_RUN="cov auth stress" NSS_AIA_PATH= NSS_AIA_HTTP= NSS_AIA_OCSP= IOPR_HOSTADDR_LIST= PKITS_DATA= Tests summary: -------------- Passed: 5778 Failed: 0 Failed with core: 0 Unknown status: 0 + cd ../../../../ + killall selfserv_9280 selfserv_9280: no process killed + : ++ grep -c FAILED ./mozilla/tests_results/security/localhost.1/output.log + TEST_FAILURES=0 + : test suite completed + '[' 0 -ne 0 ']' + echo 'test suite completed' + exit 0 Processing files: nss-3.13.3-1.ru6.i386 Provides: config(nss) = 3.13.3-1.ru6 libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.10.2) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.1) libnss3.so(NSS_3.11.2) libnss3.so(NSS_3.11.7) libnss3.so(NSS_3.11.9) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.1) libnss3.so(NSS_3.12.10) libnss3.so(NSS_3.12.3) libnss3.so(NSS_3.12.4) libnss3.so(NSS_3.12.5) libnss3.so(NSS_3.12.6) libnss3.so(NSS_3.12.7) libnss3.so(NSS_3.12.9) libnss3.so(NSS_3.13) libnss3.so(NSS_3.13.2) libnss3.so(NSS_3.2) libnss3.so(NSS_3.2.1) libnss3.so(NSS_3.3) libnss3.so(NSS_3.3.1) libnss3.so(NSS_3.4) libnss3.so(NSS_3.5) libnss3.so(NSS_3.6) libnss3.so(NSS_3.7) libnss3.so(NSS_3.7.1) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnss3.so(NSS_3.9.2) libnss3.so(NSS_3.9.3) libnssckbi.so libnssckbi.so(NSS_3.1) libnsspem.so libnsspem.so(NSS_3.1) libsmime3.so libsmime3.so(NSS_3.10) libsmime3.so(NSS_3.12.10) libsmime3.so(NSS_3.12.2) libsmime3.so(NSS_3.13) libsmime3.so(NSS_3.2) libsmime3.so(NSS_3.2.1) libsmime3.so(NSS_3.3) libsmime3.so(NSS_3.4) libsmime3.so(NSS_3.4.1) libsmime3.so(NSS_3.6) libsmime3.so(NSS_3.7) libsmime3.so(NSS_3.7.2) libsmime3.so(NSS_3.8) libsmime3.so(NSS_3.9) libsmime3.so(NSS_3.9.3) libssl3.so libssl3.so(NSS_3.11.4) libssl3.so(NSS_3.11.8) libssl3.so(NSS_3.12.10) libssl3.so(NSS_3.12.6) libssl3.so(NSS_3.13) libssl3.so(NSS_3.13.2) libssl3.so(NSS_3.2) libssl3.so(NSS_3.2.1) libssl3.so(NSS_3.4) libssl3.so(NSS_3.7.4) Requires(interp): /sbin/ldconfig /sbin/ldconfig Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): /sbin/ldconfig Requires(postun): /sbin/ldconfig Requires: libc.so.6 libc.so.6(GLIBC_2.0) libc.so.6(GLIBC_2.1) libc.so.6(GLIBC_2.1.3) libc.so.6(GLIBC_2.3) libc.so.6(GLIBC_2.3.4) libc.so.6(GLIBC_2.4) libdl.so.2 libfreebl3.so libnspr4.so libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.1) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.6) libnss3.so(NSS_3.2) libnss3.so(NSS_3.3) libnss3.so(NSS_3.3.1) libnss3.so(NSS_3.4) libnss3.so(NSS_3.6) libnss3.so(NSS_3.7) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnss3.so(NSS_3.9.3) libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libnssutil3.so(NSSUTIL_3.12.3) libnssutil3.so(NSSUTIL_3.12.5) libnssutil3.so(NSSUTIL_3.13) libplc4.so libplds4.so libpthread.so.0 libpthread.so.0(GLIBC_2.0) libsoftokn3.so libz.so.1 rtld(GNU_HASH) Processing files: nss-tools-3.13.3-1.ru6.i386 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: libc.so.6 libc.so.6(GLIBC_2.0) libc.so.6(GLIBC_2.1) libc.so.6(GLIBC_2.3) libc.so.6(GLIBC_2.3.4) libc.so.6(GLIBC_2.4) libdl.so.2 libnspr4.so libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.7) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.1) libnss3.so(NSS_3.12.9) libnss3.so(NSS_3.13) libnss3.so(NSS_3.2) libnss3.so(NSS_3.3) libnss3.so(NSS_3.4) libnss3.so(NSS_3.5) libnss3.so(NSS_3.6) libnss3.so(NSS_3.7) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnss3.so(NSS_3.9.2) libnss3.so(NSS_3.9.3) libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libnssutil3.so(NSSUTIL_3.12.3) libnssutil3.so(NSSUTIL_3.12.5) libnssutil3.so(NSSUTIL_3.12.7) libnssutil3.so(NSSUTIL_3.13) libplc4.so libplds4.so libpthread.so.0 libpthread.so.0(GLIBC_2.0) libsmime3.so libsmime3.so(NSS_3.10) libsmime3.so(NSS_3.2) libsmime3.so(NSS_3.3) libsmime3.so(NSS_3.4) libsmime3.so(NSS_3.6) libsmime3.so(NSS_3.9.3) libsqlite3.so.0 libssl3.so libssl3.so(NSS_3.11.8) libssl3.so(NSS_3.12.6) libssl3.so(NSS_3.13.2) libssl3.so(NSS_3.2) libssl3.so(NSS_3.4) libssl3.so(NSS_3.7.4) libz.so.1 rtld(GNU_HASH) Processing files: nss-sysinit-3.13.3-1.ru6.i386 Provides: config(nss-sysinit) = 3.13.3-1.ru6 libnsssysinit.so nss-system-init Requires(interp): /bin/sh Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): coreutils sed Requires: /bin/sh libc.so.6 libc.so.6(GLIBC_2.0) libc.so.6(GLIBC_2.1.3) libc.so.6(GLIBC_2.3) libdl.so.2 libnspr4.so libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libplc4.so libplds4.so libpthread.so.0 rtld(GNU_HASH) Processing files: nss-devel-3.13.3-1.ru6.i386 Provides: nss-static = 3.13.3-1.ru6 pkgconfig(nss) = 3.13.3 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 rpmlib(VersionedDependencies) <= 3.0.3-1 Requires: /bin/sh /usr/bin/pkg-config pkgconfig(nspr) >= 4.9 pkgconfig(nss-util) >= 3.13.3 Processing files: nss-pkcs11-devel-3.13.3-1.ru6.i386 Provides: nss-pkcs11-devel-static = 3.13.3-1.ru6 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 rpmlib(VersionedDependencies) <= 3.0.3-1 Processing files: nss-debuginfo-3.13.3-1.ru6.i386 Checking for unpackaged file(s): /usr/lib/rpm/check-files /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386 warning: Could not canonicalize hostname: opus3.rutgers.edu Wrote: /builddir/build/RPMS/nss-3.13.3-1.ru6.i386.rpm Wrote: /builddir/build/RPMS/nss-tools-3.13.3-1.ru6.i386.rpm Wrote: /builddir/build/RPMS/nss-sysinit-3.13.3-1.ru6.i386.rpm Wrote: /builddir/build/RPMS/nss-devel-3.13.3-1.ru6.i386.rpm Wrote: /builddir/build/RPMS/nss-pkcs11-devel-3.13.3-1.ru6.i386.rpm Wrote: /builddir/build/RPMS/nss-debuginfo-3.13.3-1.ru6.i386.rpm Executing(%clean): /bin/sh -e /var/tmp/rpm-tmp.hIiYH9 + umask 022 + cd /builddir/build/BUILD + cd nss-3.13.3 + /bin/rm -rf /builddir/build/BUILDROOT/nss-3.13.3-1.ru6.i386 + exit 0 Child returncode was: 0 LEAVE do -->